The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Stormshield Network Security: open redirect via Captive Portal
An attacker can deceive the user via Captive Portal of Stormshield Network Security, in order to redirect him to a malicious site...
FortiOS: open redirect via Admin WebUI Initial Password Change
An attacker can deceive the user via Admin WebUI Initial Password Change of FortiOS, in order to redirect him to a malicious site...
Puppet: information disclosure via Compromised Certificate
An attacker can bypass access restrictions to data via Compromised Certificate of Puppet, in order to obtain sensitive information...
ProFTPD: use after free via Data Transfer Memory Pools
An attacker can force the usage of a freed memory area via Data Transfer Memory Pools of ProFTPD, in order to trigger a denial of service, and possibly to run code...
ProFTPD: out-of-bounds memory reading via mod_cap getstateflags
An attacker can force a read at an invalid address via mod_cap getstateflags() of ProFTPD, in order to trigger a denial of service, or to obtain sensitive information...
ProFTPD: information disclosure via Ftpasswd File Permissions
An attacker can bypass access restrictions to data via Ftpasswd File Permissions of ProFTPD, in order to obtain sensitive information...
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
IBM DB2: denial of service via JDBC Client
An attacker can trigger a fatal error via JDBC Client of IBM DB2, in order to trigger a denial of service...
IBM DB2: denial of service via Invalid Commands
An attacker can trigger a fatal error via Invalid Commands of IBM DB2, in order to trigger a denial of service...
IBM DB2: privilege escalation via Stored Procedures Owner
An attacker can bypass restrictions via Stored Procedures Owner of IBM DB2, in order to escalate his privileges...
IBM DB2: memory leak
An attacker can create a memory leak of IBM DB2, in order to trigger a denial of service...
Mbed TLS: information disclosure via ECDSA Signature Blinded Scalar Reduction
An attacker can bypass access restrictions to data via ECDSA Signature Blinded Scalar Reduction of Mbed TLS, in order to obtain sensitive information...
GNU Aspell: out-of-bounds memory reading via ASPELL_CONF UCS
An attacker can force a read at an invalid address via ASPELL_CONF UCS of GNU Aspell, in order to trigger a denial of service, or to obtain sensitive information...
PHP: infinite loop via php-fpm Non-blocking STDIN Stream
An attacker can trigger an infinite loop via php-fpm Non-blocking STDIN Stream of PHP, in order to trigger a denial of service...
Sway: privilege escalation via Unlock After Sleep
An attacker can bypass restrictions via Unlock After Sleep of Sway, in order to escalate his privileges...
WebKitGTK: five vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
QEMU: NULL pointer dereference via AHCI
An attacker can force a NULL pointer to be dereferenced via AHCI of QEMU, in order to trigger a denial of service...
libgd: NULL pointer dereference via gdImageClone
An attacker can force a NULL pointer to be dereferenced via gdImageClone() of libgd, in order to trigger a denial of service...
Node.js Modules: multiple vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Zope: information disclosure via Header Spoofing
An attacker can bypass access restrictions to data via Header Spoofing of Zope, in order to obtain sensitive information...
Netty: information disclosure via HttpObjectDecoder.java Double Content-Length
An attacker can bypass access restrictions to data via HttpObjectDecoder.java Double Content-Length of Netty, in order to obtain sensitive information...
Netty: information disclosure via HttpObjectDecoder.java HTTP Header Injection
An attacker can bypass access restrictions to data via HttpObjectDecoder.java HTTP Header Injection of Netty, in order to obtain sensitive information...
FasterXML jackson-databind: privilege escalation via Net.sf.ehcache Blocking
An attacker can bypass restrictions via Net.sf.ehcache Blocking of FasterXML jackson-databind, in order to escalate his privileges...
Linux kernel: infinite loop via ext4_protect_reserved_inode
An attacker can trigger an infinite loop via ext4_protect_reserved_inode() of the Linux kernel, in order to trigger a denial of service...
ESET NOD32 Antivirus: privilege escalation via BZ2 Checksum Archive Bypass
An attacker can bypass restrictions via BZ2 Checksum Archive Bypass of ESET NOD32 Antivirus, in order to escalate his privileges...
Nextcloud Server: information disclosure via File-Drop Share Link
An attacker can bypass access restrictions to data via File-Drop Share Link of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: information disclosure via Server-Side Request Forgery
An attacker can bypass access restrictions to data via Server-Side Request Forgery of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: privilege escalation via Group Admins User Creation
An attacker can bypass restrictions via Group Admins User Creation of Nextcloud Server, in order to escalate his privileges...
Nextcloud Server: information disclosure via Lookup Server
An attacker can bypass access restrictions to data via Lookup Server of Nextcloud Server, in order to obtain sensitive information...
Nextcloud Server: information disclosure via Improper Permissions Preservation
An attacker can bypass access restrictions to data via Improper Permissions Preservation of Nextcloud Server, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1012 1014 1015 1016 1017 1018 1019 1020 1021 1022