The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ProFTPD: information disclosure via Ftpasswd File Permissions
An attacker can bypass access restrictions to data via Ftpasswd File Permissions of ProFTPD, in order to obtain sensitive information...
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
IBM DB2: denial of service via JDBC Client
An attacker can trigger a fatal error via JDBC Client of IBM DB2, in order to trigger a denial of service...
IBM DB2: denial of service via Invalid Commands
An attacker can trigger a fatal error via Invalid Commands of IBM DB2, in order to trigger a denial of service...
IBM DB2: privilege escalation via Stored Procedures Owner
An attacker can bypass restrictions via Stored Procedures Owner of IBM DB2, in order to escalate his privileges...
IBM DB2: memory leak
An attacker can create a memory leak of IBM DB2, in order to trigger a denial of service...
Mbed TLS: information disclosure via ECDSA Signature Blinded Scalar Reduction
An attacker can bypass access restrictions to data via ECDSA Signature Blinded Scalar Reduction of Mbed TLS, in order to obtain sensitive information...
GNU Aspell: out-of-bounds memory reading via ASPELL_CONF UCS
An attacker can force a read at an invalid address via ASPELL_CONF UCS of GNU Aspell, in order to trigger a denial of service, or to obtain sensitive information...
PHP: infinite loop via php-fpm Non-blocking STDIN Stream
An attacker can trigger an infinite loop via php-fpm Non-blocking STDIN Stream of PHP, in order to trigger a denial of service...
Sway: privilege escalation via Unlock After Sleep
An attacker can bypass restrictions via Unlock After Sleep of Sway, in order to escalate his privileges...
WebKitGTK: five vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
QEMU: NULL pointer dereference via AHCI
An attacker can force a NULL pointer to be dereferenced via AHCI of QEMU, in order to trigger a denial of service...
libgd: NULL pointer dereference via gdImageClone
An attacker can force a NULL pointer to be dereferenced via gdImageClone() of libgd, in order to trigger a denial of service...
Node.js Modules: multiple vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Zope: information disclosure via Header Spoofing
An attacker can bypass access restrictions to data via Header Spoofing of Zope, in order to obtain sensitive information...
Netty: information disclosure via HttpObjectDecoder.java Double Content-Length
An attacker can bypass access restrictions to data via HttpObjectDecoder.java Double Content-Length of Netty, in order to obtain sensitive information...
Netty: information disclosure via HttpObjectDecoder.java HTTP Header Injection
An attacker can bypass access restrictions to data via HttpObjectDecoder.java HTTP Header Injection of Netty, in order to obtain sensitive information...
FasterXML jackson-databind: privilege escalation via Net.sf.ehcache Blocking
An attacker can bypass restrictions via Net.sf.ehcache Blocking of FasterXML jackson-databind, in order to escalate his privileges...
Linux kernel: infinite loop via ext4_protect_reserved_inode
An attacker can trigger an infinite loop via ext4_protect_reserved_inode() of the Linux kernel, in order to trigger a denial of service...
ESET NOD32 Antivirus: privilege escalation via BZ2 Checksum Archive Bypass
An attacker can bypass restrictions via BZ2 Checksum Archive Bypass of ESET NOD32 Antivirus, in order to escalate his privileges...
Nextcloud Server: information disclosure via File-Drop Share Link
An attacker can bypass access restrictions to data via File-Drop Share Link of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: information disclosure via Server-Side Request Forgery
An attacker can bypass access restrictions to data via Server-Side Request Forgery of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: privilege escalation via Group Admins User Creation
An attacker can bypass restrictions via Group Admins User Creation of Nextcloud Server, in order to escalate his privileges...
Nextcloud Server: information disclosure via Lookup Server
An attacker can bypass access restrictions to data via Lookup Server of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: information disclosure via Improper Permissions Preservation
An attacker can bypass access restrictions to data via Improper Permissions Preservation of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: privilege escalation via Workflow Rules MIME File Extension
An attacker can bypass restrictions via Workflow Rules MIME File Extension of Nextcloud Server, in order to escalate his privileges...
OpenBSD: memory corruption via vmm_pvclock
An attacker, inside a guest system, can trigger a memory corruption via vmm_pvclock of OpenBSD, in order to trigger a denial of service, and possibly to run code on the host system...
FortiManager: information disclosure via Cross-Site WebSocket Hijacking
An attacker can bypass access restrictions to data via Cross-Site WebSocket Hijacking of FortiManager, in order to obtain sensitive information...
radare2: memory corruption via r_asm_pseudo_incbin
An attacker can trigger a memory corruption via r_asm_pseudo_incbin() of radare2, in order to trigger a denial of service, and possibly to run code...
radare2: integer overflow via new_token_size
An attacker can trigger an integer overflow via new_token_size() of radare2, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1002 1003 1004 1005 1006 1007 1008 1009 1011 1013 1014 1015 1016 1017 1018 1019 1020 1021 1041 1057