The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft SharePoint Server: file reading
A local attacker can read a file of Microsoft SharePoint Server, in order to obtain sensitive information...
Contao: three vulnerabilities
An attacker can use several vulnerabilities of Contao...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
IBM API Connect: information disclosure via Weak Cryptographic Algorithms
An attacker can bypass access restrictions to data via Weak Cryptographic Algorithms of IBM API Connect, in order to obtain sensitive information...
TYPO3 Core: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
TYPO3 Extensions: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Extensions...
IBM MQ: denial of service via Queue Manager MQPUT
An attacker can trigger a fatal error via Queue Manager MQPUT of IBM MQ, in order to trigger a denial of service...
IBM API Connect Developer Portal: privilege escalation via Credential Caching
An attacker can bypass restrictions via Credential Caching of IBM API Connect Developer Portal, in order to escalate his privileges...
F5 BIG-IP LTM: denial of service via HTTP/2 Ping Flood
An attacker can trigger a fatal error via HTTP/2 Ping Flood of F5 BIG-IP LTM, in order to trigger a denial of service...
Apache Xerces-C: use after free via External DTD
An attacker can force the usage of a freed memory area via External DTD of Apache Xerces-C, in order to trigger a denial of service, and possibly to run code...
NetBSD: privilege escalation via Filemon Module
An attacker can bypass restrictions via Filemon Module of NetBSD, in order to escalate his privileges...
RHEL 8 kpatch-patch: denial of service via Machine Check Error On Page Size Change
An attacker can trigger a fatal error via Machine Check Error On Page Size Change of RHEL 8 kpatch-patch, in order to trigger a denial of service...
AngularJS: privilege escalation via Object.prototype merge
An attacker can bypass restrictions via Object.prototype merge() of AngularJS, in order to escalate his privileges...
Ansible Tower: three vulnerabilities
An attacker can use several vulnerabilities of Ansible Tower...
CUPS: out-of-bounds memory reading via ippSetValuetag/array_find
An attacker can force a read at an invalid address via ippSetValuetag()/array_find() of CUPS, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: use after free via snd_timer_open
An attacker can force the usage of a freed memory area via snd_timer_open() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Telerik UI for ASP.NET AJAX: read-write access via RadChart
An attacker can bypass access restrictions via RadChart of Telerik UI for ASP.NET AJAX, in order to read or alter data...
Intel processors: privilege escalation via Virtualized Environment Page Fault
An attacker can bypass restrictions via Virtualized Environment Page Fault of Intel, in order to escalate his privileges...
Intel processors: information disclosure via PlunderVolt
An attacker can alter the power voltage of some Intel processors, in order to obtain sensitive information (VIGILANCE-ACTU-6179)...
Apache SpamAssassin: denial of service via Security Note
An attacker can trigger a fatal error via Security Note of Apache SpamAssassin, in order to trigger a denial of service...
Apache SpamAssassin: code execution via CF Files
An attacker can use a vulnerability via CF Files of Apache SpamAssassin, in order to run code...
libpgf: use after free via Decoder.cpp
An attacker can force the usage of a freed memory area via Decoder.cpp of libpgf, in order to trigger a denial of service, and possibly to run code...
DAViCal CalDAV Server: three vulnerabilities
An attacker can use several vulnerabilities of DAViCal CalDAV Server...
Horde Trean: Cross Site Request Forgery via treanBookmarkTags
An attacker can trigger a Cross Site Request Forgery via treanBookmarkTags of Horde Trean, in order to force the victim to perform operations...
WordPress Core: five vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
TeamViewer: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on TeamViewer, in order to read or write data in the session...
Linux kernel: information disclosure via /proc/pid/stat
An attacker can bypass access restrictions to data via /proc/pid/stat of the Linux kernel, in order to obtain sensitive information...
Linux kernel: use after free via debugfs_remove
An attacker can force the usage of a freed memory area via debugfs_remove() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 986 987 988 989 990 991 992 993 994 996 998 999 1000 1001 1002 1003 1004 1005 1006 1021 1023