The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenEXR: memory leak via ThreadPool
An attacker can create a memory leak via ThreadPool of OpenEXR, in order to trigger a denial of service...
Hunspell: out-of-bounds memory reading via SuggestMgr-leftcommonsubstring
An attacker can force a read at an invalid address via SuggestMgr::leftcommonsubstring() of Hunspell, in order to trigger a denial of service, or to obtain sensitive information...
Asterisk: denial of service via T.38 SDP Re-invite
An attacker can trigger a fatal error via T.38 SDP Re-invite of Asterisk, in order to trigger a denial of service...
Asterisk: privilege escalation via AMI Originate Request
An attacker can bypass restrictions via AMI Originate Request of Asterisk, in order to escalate his privileges...
Asterisk: information disclosure via SIP Peer IP Address Change
An attacker can bypass access restrictions to data via SIP Peer IP Address Change of Asterisk, in order to obtain sensitive information...
Node.js Angular: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js Angular, in order to escalate his privileges...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Cisco SD-WAN Solution: Cross Site Request Forgery via vManage
An attacker can trigger a Cross Site Request Forgery via vManage of Cisco SD-WAN Solution, in order to force the victim to perform operations...
Cisco Unity Express: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco Unity Express, in order to escalate his privileges...
Cisco IOS XR: privilege escalation via NETCONF Over SSH
An attacker can bypass restrictions via NETCONF Over SSH of Cisco IOS XR, in order to escalate his privileges...
Cisco Email Security Appliance: privilege escalation via URL Filtering Bypass
An attacker can bypass restrictions via URL Filtering Bypass of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco Email Security Appliance: privilege escalation via MP3 Content Filter Bypass
An attacker can bypass restrictions via MP3 Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco Unified Communications Manager: SQL injection via Web-based Management Interface
An attacker can use a SQL injection via Web-based Management Interface of Cisco Unified Communications Manager, in order to read or alter data...
Linux kernel: information disclosure via __btrfs_free_extent
A local attacker can read a memory fragment via __btrfs_free_extent() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: NULL pointer dereference via ext4_empty_dir
An attacker can force a NULL pointer to be dereferenced via ext4_empty_dir() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via btrfs_root_node
An attacker can force a NULL pointer to be dereferenced via btrfs_root_node() of the Linux kernel, in order to trigger a denial of service...
XStream API: code execution via Deserialization
An attacker can use a vulnerability via Deserialization of XStream API, in order to run code...
ClamAV: denial of service via MIME Messages Parsing
An attacker can trigger a fatal error via MIME Messages Parsing of ClamAV, in order to trigger a denial of service...
ISC BIND: denial of service via TCP-pipelined Queries Tcp-clients Limit Bypass
An attacker can trigger a fatal error via TCP-pipelined Queries Tcp-clients Limit Bypass of ISC BIND, in order to trigger a denial of service...
Node.js handlebars: two vulnerabilities
An attacker can use several vulnerabilities of Node.js handlebars...
Stormshield Network Security: five vulnerabilities
An attacker can use several vulnerabilities of Stormshield Network Security...
FortiOS: Man-in-the-Middle via FortiGuard Services Communication Hard-coded Cryptographic Key
An attacker can act as a Man-in-the-Middle via FortiGuard Services Communication Hard-coded Cryptographic Key on FortiOS, in order to read or write data in the session...
FortiOS: information disclosure via Backup Hard-coded Cryptographic Key
An attacker can bypass access restrictions to data via Backup Hard-coded Cryptographic Key of FortiOS, in order to obtain sensitive information...
FortiOS: denial of service via SSL VPN Portal POST Request
An attacker can trigger a fatal error via SSL VPN Portal POST Request of FortiOS, in order to trigger a denial of service...
Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Linux kernel: multiple vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...
Linux kernel: five vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 978 979 980 981 982 983 984 985 986 988 990 991 992 993 994 995 996 997 998 1001 1021 1041 1059