The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS XE: privilege escalation via File Location Validation
An attacker can bypass restrictions via File Location Validation of Cisco IOS XE, in order to escalate his privileges...
Jenkins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins...
Cisco IOS: privilege escalation via IOx Guest OS
An attacker can bypass restrictions via IOx Guest OS of Cisco IOS, in order to escalate his privileges...
Cisco IOS, IOS XE: denial of service via IP Ident
An attacker can trigger a fatal error via IP Ident of Cisco IOS or IOS XE, in order to trigger a denial of service...
Cisco IOS XE: denial of service via HTTP Server
An attacker can trigger a fatal error via HTTP Server of Cisco IOS XE, in order to trigger a denial of service...
IBM MQ: memory leak via cluster
An attacker can create a memory leak via cluster of IBM MQ, in order to trigger a denial of service...
Cisco IOS, IOS XE: read-write access via HTTP Client
An attacker can bypass access restrictions via HTTP Client of Cisco IOS ou IOS XE, in order to read or alter data...
Cisco IOS XE: denial of service via FTP Application Layer Gateway
An attacker can trigger a fatal error via FTP Application Layer Gateway of Cisco IOS XE, in order to trigger a denial of service...
Cisco IOS XE: directory traversal
An attacker can traverse directories of Cisco IOS XE, in order to read a file outside the service root path...
Cisco IOS XE: denial of service via TrustSec PAC
An attacker can trigger a fatal error via TrustSec PAC of Cisco IOS XE, in order to trigger a denial of service...
IBM MQ: privilege escalation via session fixation
An attacker can define his session in IBM MQ, in order to get another user's privileges...
Cisco Catalyst 4000: denial of service via TCP
An attacker can send malicious TCP packets to Cisco Catalyst 4000, in order to trigger a denial of service...
Cisco IOS XE: privilege escalation via ASIC Register Write
An attacker can bypass restrictions via ASIC Register Write of Cisco IOS XE, in order to escalate his privileges...
Drupal Gutenberg: privilege escalation
An attacker can make profit of the lack of authorization check by Drupal Gutenberg, in order to read ou change any document...
Drupal Permissions by Term: information disclosure
An attacker can make profit of wrong default permissions in Drupal Permissions by Term, in order to get sensitive information...
Lemonldap-NG: privilege escalation via OIDC authorization
An attacker can bypass restrictions via OIDC of Lemonldap::NG, in order to escalate his privileges...
Nokogiri: shell command injection via open
An attacker can inject shell command in filenames used by Nokogiri with open(), in order to run code...
Linux kernel: use after free via gfs2_clear_rgrpd
An attacker can force the usage of a freed memory area via gfs2_clear_rgrpd() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
links: information disclosure via DNS Requests
An attacker can bypass access restrictions to data via DNS Requests of links, in order to obtain sensitive information...
Ghostscript: denial of service via opj_t1_encode_cblks
An attacker can trigger a fatal error via opj_t1_encode_cblks() of Ghostscript, in order to trigger a denial of service...
GNOME File-roller: directory traversal via TAR Archive
An attacker can traverse directories via TAR Archive of GNOME File-roller, in order to read a file outside the service root path...
Linux kernel: use after free via SMB2_read
An attacker can force the usage of a freed memory area via SMB2_read() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via SMB2_write
An attacker can force the usage of a freed memory area via SMB2_write() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory leak via genl_register_family
An attacker can create a memory leak via genl_register_family() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: use after free via hci_uart_register_dev
An attacker can force the usage of a freed memory area via hci_uart_register_dev() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: out-of-bounds memory reading via build_audio_procunit
An attacker can force a read at an invalid address via build_audio_procunit() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: use after free via rsi_mac80211_detach
An attacker can force the usage of a freed memory area via rsi_mac80211_detach() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via Spectre Backport
An attacker can bypass access restrictions to data via Spectre Backport of the Linux kernel, in order to obtain sensitive information...
Linux kernel: buffer overflow via net/wireless/nl80211.c
An attacker can trigger a buffer overflow via net/wireless/nl80211.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via fs/xfs/xfs_super.c
An attacker can force the usage of a freed memory area via fs/xfs/xfs_super.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 962 963 964 965 966 967 968 969 971 973 974 975 976 977 978 979 980 981 1001 1021 1041 1061 1069