The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mozilla NSS: buffer overflow via Cryptographic Primitives
An attacker can trigger a buffer overflow via Cryptographic Primitives of Mozilla NSS, in order to trigger a denial of service, and possibly to run code...
Mitel SIP-DECT: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Mitel SIP-DECT, in order to read or write data in the session...
Node.js type-graphql: information disclosure via Error Message Resolver Source Code
An attacker can bypass access restrictions to data via Error Message Resolver Source Code of Node.js type-graphql, in order to obtain sensitive information...
Check Point Endpoint Security Client for Windows: denial of service via Non-standard Locations Log Files Storing
An attacker can trigger a fatal error via Non-standard Locations Log Files Storing of Check Point Endpoint Security Client for Windows, in order to trigger a denial of service...
Forcepoint NGFW Security Management Center: privilege escalation via Incorrect IPsec Configuration
An attacker can bypass restrictions via Incorrect IPsec Configuration of Forcepoint NGFW Security Management Center, in order to escalate his privileges...
Linux kernel: use after free via cpia2_exit
An attacker can force the usage of a freed memory area via cpia2_exit() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via sas_discover.c
An attacker can force a NULL pointer to be dereferenced via sas_discover.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via drop_sysctl_table
An attacker can force a NULL pointer to be dereferenced via drop_sysctl_table() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: information disclosure via kvaser_usb_leaf.c
A local attacker can read a memory fragment via kvaser_usb_leaf.c of the Linux kernel, in order to obtain sensitive information...
MediaWiki: open redirect via Title_blacklist
An attacker can deceive the user via Title_blacklist of MediaWiki, in order to redirect him to a malicious site...
ImageMagick: out-of-bounds memory reading via WritePNGImage
An attacker can force a read at an invalid address via WritePNGImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: buffer overflow via WriteSGIImage
An attacker can trigger a buffer overflow via WriteSGIImage() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
libxml2: memory leak via xmlParseBalancedChunkMemoryRecover
An attacker can create a memory leak via xmlParseBalancedChunkMemoryRecover() of libxml2, in order to trigger a denial of service...
OpenSC: out-of-bounds memory reading via SETCOS File Attribute
An attacker can force a read at an invalid address via SETCOS File Attribute of OpenSC, in order to trigger a denial of service, or to obtain sensitive information...
SQLite: five vulnerabilities
An attacker can use several vulnerabilities of SQLite...
Docker docker-credential-secretservice: use after free
An attacker can force the usage of a freed memory area of Docker docker-credential-secretservice, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via cpu.cfs_quota_us
An attacker can trigger a fatal error via cpu.cfs_quota_us of the Linux kernel, in order to trigger a denial of service...
TigerVNC: multiple vulnerabilities
An attacker can use several vulnerabilities of TigerVNC...
libyang: buffer overflow via make_canonical
An attacker can trigger a buffer overflow via make_canonical() of libyang, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: information disclosure via Multi-bladed vCMP Fragmentation Attack
An attacker can bypass access restrictions to data via Multi-bladed vCMP Fragmentation Attack of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP LTM: memory leak via MFC tmrouted
An attacker can create a memory leak via MFC tmrouted of F5 BIG-IP LTM, in order to trigger a denial of service...
F5 BIG-IP: denial of service via Virtual Edition Virtio Direct Descriptors
An attacker can trigger a fatal error via Virtual Edition Virtio Direct Descriptors of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via FastL4 Loose Initiation
An attacker can trigger a fatal error via FastL4 Loose Initiation of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP LTM: denial of service via MRF Diameter 32K Connections
An attacker can trigger a fatal error via MRF Diameter 32K Connections of F5 BIG-IP LTM, in order to trigger a denial of service...
F5 BIG-IP: read-write access via SCP Blacklist
An attacker can bypass access restrictions via SCP Blacklist of F5 BIG-IP, in order to read or alter data...
F5 BIG-IP: denial of service via TMM FastL4
An attacker can trigger a fatal error via TMM FastL4 of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP ASM: denial of service via HTTP Responses
An attacker can trigger a fatal error via HTTP Responses of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP APM: information disclosure via STP Pass Through VLAN-tagged Frames
An attacker can bypass access restrictions to data via STP Pass Through VLAN-tagged Frames of F5 BIG-IP APM, in order to obtain sensitive information...
F5 BIG-IP APM: information disclosure via client-session-id
An attacker can bypass access restrictions to data via client-session-id of F5 BIG-IP APM, in order to obtain sensitive information...
F5 BIG-IP: privilege escalation via iRules
An attacker can bypass restrictions via iRules of F5 BIG-IP, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 989 990 991 992 993 994 995 996 997 999 1001 1002 1003 1004 1005