The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP: information disclosure via DNS Rebinding
An attacker can bypass access restrictions to data via DNS Rebinding of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: information disclosure via restjavad
An attacker can bypass access restrictions to data via restjavad of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP APM: denial of service via apd/apmd
An attacker can trigger a fatal error via apd/apmd of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP: infinite loop via TMM HTTP Request
An attacker can trigger an infinite loop via TMM HTTP Request of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via TLS 1.3 Incoming Messages
An attacker can trigger a fatal error via TLS 1.3 Incoming Messages of F5 BIG-IP, in order to trigger a denial of service...
Debian: privilege escalation via postgresql-common pg_ctlcluster Directory Creation
An attacker can bypass restrictions via postgresql-common pg_ctlcluster Directory Creation of Debian, in order to escalate his privileges...
openSUSE, SUSE LE: privilege escalation via /usr/sbin/pinger
An attacker can bypass restrictions via /usr/sbin/pinger of openSUSE or SUSE LE 15, in order to escalate his privileges...
Ghostscript: code execution via Charkeys dSAFER Escape
An attacker can use a vulnerability via Charkeys dSAFER Escape of Ghostscript, in order to run code...
Joomla J2Store: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla J2Store, in order to run JavaScript code in the context of the web site...
FasterXML jackson-databind: information disclosure via net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup Polymorphic Typing
An attacker can bypass access restrictions to data via net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup Polymorphic Typing of FasterXML jackson-databind, in order to obtain sensitive information...
Drupal Modules: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Modules...
Ansible Core: information disclosure via Splunk/Sumologic Callback Plugins
An attacker can bypass access restrictions to data via Splunk/Sumologic Callback Plugins of Ansible Core, in order to obtain sensitive information...
libjpeg-turbo: buffer overflow via generate_jsimd_ycc_rgb_convert_neon
An attacker can trigger a buffer overflow via generate_jsimd_ycc_rgb_convert_neon() of libjpeg-turbo, in order to trigger a denial of service, and possibly to run code...
FreeIPA: two vulnerabilities via DNS Recursion / Amplification
An attacker can use several vulnerabilities via DNS Recursion / Amplification of FreeIPA...
Symfony: code execution via AbstractAdapter / TagAwareAdapter
An attacker can use a vulnerability via AbstractAdapter / TagAwareAdapter of Symfony, in order to run code...
Symfony: privilege escalation via MimeTypeGuesser Argument Injection
An attacker can bypass restrictions via MimeTypeGuesser Argument Injection of Symfony, in order to escalate his privileges...
Symfony: information disclosure via UriSigner Time Comparison
An attacker can bypass access restrictions to data via UriSigner Time Comparison of Symfony, in order to obtain sensitive information...
Symfony: information disclosure via Switch User Enumeration
An attacker can bypass access restrictions to data via Switch User Enumeration of Symfony, in order to obtain sensitive information...
Symfony: Cross Site Scripting via VarExporter
An attacker can trigger a Cross Site Scripting via VarExporter of Symfony, in order to run JavaScript code in the context of the web site...
Google Chrome: four vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Ruby Loofah: code execution via SVG Republished Element
An attacker can use a vulnerability via SVG Republished Element of Ruby Loofah, in order to run code...
IBM Spectrum Protect Plus: information disclosure via Restored Files Permissions
An attacker can bypass access restrictions to data via Restored Files Permissions of IBM Spectrum Protect Plus, in order to obtain sensitive information...
VMware Workstation: three vulnerabilities
An attacker can use several vulnerabilities of VMware Workstation...
Ubuntu: three vulnerabilities via shiftfs
An attacker can use several vulnerabilities via shiftfs of Ubuntu...
DPDK: memory leak
An attacker can create a memory leak of DPDK, in order to trigger a denial of service...
WebKitGTK: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
iwd: multiple vulnerabilities
An attacker can use several vulnerabilities of iwd...
Intel Processors: information disclosure via SGX
An attacker can bypass access restrictions to data via SGX of Intel Processors, in order to obtain sensitive information...
Intel Ethernet 700 Series Controllers: multiple vulnerabilities
An attacker can use several vulnerabilities of Intel Ethernet 700 Series Controllers...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 976 977 978 979 980 981 982 983 984 986 988 989 990 991 992 993 994 995 996 1001 1021 1041 1061 1078