The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Kibana: privilege escalation via Lodash Prototype Pollution
An attacker can bypass restrictions via Lodash Prototype Pollution of Kibana, in order to escalate his privileges...
Elasticsearch: information disclosure via Response Headers
An attacker can bypass access restrictions to data via Response Headers of Elasticsearch, in order to obtain sensitive information...
OpenSSL Windows: privilege escalation via OPENSSLDIR
An attacker can bypass restrictions via OPENSSLDIR of OpenSSL Windows, in order to escalate his privileges...
Oniguruma: NULL pointer dereference via match_at
An attacker can force a NULL pointer to be dereferenced via match_at() of Oniguruma, in order to trigger a denial of service...
Puppet Enterprise cd4pe: privilege escalation via Password PE console
An attacker can bypass restrictions via Password PE console of Puppet Enterprise cd4pe, in order to escalate his privileges...
Puppet Enterprise: privilege escalation via Express Install Admin Default Password
An attacker can bypass restrictions via Express Install Admin Default Password of Puppet Enterprise, in order to escalate his privileges...
Nagios Core: Cross Site Scripting via main.php/map.php
An attacker can trigger a Cross Site Scripting via main.php/map.php of Nagios Core, in order to run JavaScript code in the context of the web site...
WordPress WP Fastest Cache: directory traversal
An attacker can traverse directories of WordPress WP Fastest Cache, in order to read a file outside the service root path...
OpenEXR: denial of service via Header-readfrom
An attacker can trigger a fatal error via Header::readfrom() of OpenEXR, in order to trigger a denial of service...
radare2: use after free via cmd_mount
An attacker can force the usage of a freed memory area via cmd_mount() of radare2, in order to trigger a denial of service, and possibly to run code...
Wind River VxWorks: multiple vulnerabilities via IPnet
An attacker can use several vulnerabilities via IPnet of Wind River VxWorks...
Linux kernel: denial of service via setup_format_params
An attacker can trigger a fatal error via setup_format_params() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: out-of-bounds memory reading via set_geometry
An attacker can force a read at an invalid address via set_geometry() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Trend Micro OfficeScan: denial of service
An attacker can trigger a fatal error of Trend Micro OfficeScan, in order to trigger a denial of service...
WordPress Simple Membership: Cross Site Request Forgery via Bulk Operation menu
An attacker can trigger a Cross Site Request Forgery via Bulk Operation menu of WordPress Simple Membership, in order to force the victim to perform operations...
OpenLDAP: privilege escalation via SASL
An attacker can bypass restrictions via SASL of OpenLDAP, in order to escalate his privileges...
OpenLDAP: privilege escalation via rootDN
An attacker can bypass restrictions via rootDN of OpenLDAP, in order to escalate his privileges...
Deepin Clone: four vulnerabilities
An attacker can use several vulnerabilities of Deepin Clone...
Simple DirectMedia Layer: buffer overflow via SDL2_image
An attacker can trigger a buffer overflow via SDL2_image() of Simple DirectMedia Layer, in order to trigger a denial of service, and possibly to run code...
WordPress Advanced CF7 DB: SQL injection
An attacker can use a SQL injection of WordPress Advanced CF7 DB, in order to read or alter data...
WordPress Photo Gallery: SQL injection
An attacker can use a SQL injection of WordPress Photo Gallery, in order to read or alter data...
Docker Engine: privilege escalation via Chroot Nsswitch
An attacker can bypass restrictions via Chroot Nsswitch of Docker Engine, in order to escalate his privileges...
FortiGate: privilege escalation via Unverified LDAP Server Identity
An attacker can bypass restrictions via Unverified LDAP Server Identity of FortiGate, in order to escalate his privileges...
FortiClient for Windows: denial of service
An attacker can trigger a fatal error of FortiClient for Windows, in order to trigger a denial of service...
Linux kernel: privilege escalation via Tracing Process Seccomp Syscall Modify
An attacker can bypass restrictions via Tracing Process Seccomp Syscall Modify of the Linux kernel, in order to escalate his privileges...
WebSphere AS Liberty Admin Center: information disclosure via Clickjacking
An attacker can bypass access restrictions to data via Clickjacking of WebSphere AS Liberty Admin Center, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 944 945 946 947 948 949 950 951 952 954 956 957 958 959 960 961 962 963 964 981 1001 1020