The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ESA: privilege escalation via SPF Header Bypass
An attacker can bypass restrictions via SPF Header Bypass of Cisco ESA, in order to escalate his privileges...
Cisco ASA: privilege escalation via Web-based Management Interface
An attacker can bypass restrictions via Web-based Management Interface of Cisco ASA, in order to escalate his privileges...
Cisco ASA: privilege escalation via Smart Tunnel
An attacker can bypass restrictions via Smart Tunnel of Cisco ASA, in order to escalate his privileges...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Node.js Modules: malicious code
Several Node.js modules are malicious, which can be used by an attacker in order to run code...
Google Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
MongoDB Server: privilege escalation via Deleted User Persistent Session
An attacker can bypass restrictions via Deleted User Persistent Session of MongoDB Server, in order to escalate his privileges...
WordPress Popup Builder: SQL injection
An attacker can use a SQL injection of WordPress Popup Builder, in order to read or alter data...
TeamPass: Cross Site Scripting via Import Items
An attacker can trigger a Cross Site Scripting via Import Items of TeamPass, in order to run JavaScript code in the context of the web site...
Linux kernel: information disclosure via create_qp_common
A local attacker can read a memory fragment via create_qp_common() of the Linux kernel, in order to obtain sensitive information...
Open Build Service: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Open Build Service osc, in order to read or write data in the session...
BWA: buffer overflow via bns_restore
An attacker can trigger a buffer overflow via bns_restore() of BWA, in order to trigger a denial of service, and possibly to run code...
aubio: three vulnerabilities
An attacker can use several vulnerabilities of aubio...
FreeBSD: memory corruption via bhyve e1000
An attacker, inside a guest system, can trigger a memory corruption via bhyve e1000 of FreeBSD, in order to trigger a denial of service, and possibly to run code on the host system...
FreeBSD: out-of-bounds memory reading via bsnmp
An attacker can force a read at an invalid address via bsnmp of FreeBSD, in order to trigger a denial of service, or to obtain sensitive information...
FreeBSD: memory corruption via ICMPv6 MLDv2
An attacker can trigger a memory corruption via ICMPv6 MLDv2 of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: denial of service via epoch
An attacker can trigger a fatal error via epoch of FreeBSD, in order to trigger a denial of service...
Intel 64-bit CPU: information disclosure via SWAPGS
A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information...
OpenStack Nova: information disclosure via Fault Condition
An attacker can bypass access restrictions to data via Fault Condition of OpenStack Nova, in order to obtain sensitive information...
mod_auth_openidc: privilege escalation via OIDC_CLAIM
An attacker can bypass restrictions via OIDC_CLAIM of mod_auth_openidc, in order to escalate his privileges...
mod_auth_openidc: privilege escalation via Page Content Spoof
An attacker can bypass restrictions via Page Content Spoof of mod_auth_openidc, in order to escalate his privileges...
systemd: denial of service via PIDFile Service Killing
An attacker can trigger a fatal error via PIDFile Service Killing of systemd, in order to trigger a denial of service...
ZZIPlib: memory leak via __zzip_parse_root_directory
An attacker can create a memory leak via __zzip_parse_root_directory() of ZZIPlib, in order to trigger a denial of service...
GNU Binutils: integer overflow via objdump
An attacker can trigger an integer overflow via objdump of GNU Binutils, in order to trigger a denial of service, and possibly to run code...
libiberty: NULL pointer dereference via work_stuff_copy_to_from
An attacker can force a NULL pointer to be dereferenced via work_stuff_copy_to_from() of libiberty, in order to trigger a denial of service...
libiberty: denial of service via arm_pt
An attacker can trigger a fatal error via arm_pt() of libiberty, in order to trigger a denial of service...
Node.js Modules: malicious code
Several Node.js modules are malicious, which can be used by an attacker in order to run code...
Node.js grpc-ts-health-check: denial of service
An attacker can trigger a fatal error of Node.js grpc-ts-health-check, in order to trigger a denial of service...
Google Android: multiple vulnerabilities of August 2019
An attacker can use several vulnerabilities of Google Android...
WordPress JoomSport: SQL injection
An attacker can use a SQL injection of WordPress JoomSport, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 946 947 948 949 950 951 952 953 954 956 958 959 960 961 962 963 964 965 966 981 1001 1020