The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
JasPer: denial of service via jpc_dec_process_sot
An attacker can trigger a fatal error via jpc_dec_process_sot() of JasPer, in order to trigger a denial of service...
Fortinet FortiClient: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Fortinet FortiClient...
netdata: vulnerability
A vulnerability of netdata was announced...
SQLite: denial of service via sqlite3ExprCodeTarget
An attacker can trigger a fatal error via sqlite3ExprCodeTarget() of SQLite, in order to trigger a denial of service...
SQLite: integer overflow via sqlite3_str_vappendf
An attacker can trigger an integer overflow via sqlite3_str_vappendf() of SQLite, in order to trigger a denial of service, and possibly to run code...
PowerDNS Recursor: information disclosure via gethostname
An attacker can bypass access restrictions to data via gethostname() of PowerDNS Recursor, in order to obtain sensitive information...
RPyC: code execution via Object Attributes
An attacker can use a vulnerability via Object Attributes of RPyC, in order to run code...
OpenBSD 6.7: denial of service via smtpd_sockaddr
An attacker can trigger a fatal error via smtpd_sockaddr of OpenBSD 6.7 (OpenSMTPD), in order to trigger a denial of service...
NLnet Labs Unbound: overload via Answers Parsing
An attacker can trigger an overload via Answers Parsing of NLnet Labs Unbound, in order to trigger a denial of service...
ISC BIND: denial of service via tsig.c
An attacker can trigger a fatal error via tsig.c of ISC BIND, in order to trigger a denial of service...
Apache log4net: external XML entity injection via Configuration Files
An attacker can transmit malicious XML data via Configuration Files to Apache log4net, in order to read a file, scan sites, or trigger a denial of service...
qmail-verify: information disclosure
An attacker can bypass access restrictions to data of qmail-verify, in order to obtain sensitive information...
qmail-verify: spoofing via Mail Address Verification Bypass
An attacker can create spoofed data via Mail Address Verification Bypass of qmail-verify, in order to deceive the victim...
Rack: directory traversal via Rack-Directory
An attacker can traverse directories via Rack::Directory of Rack, in order to read a file outside the service root path...
Grafana: Cross Site Scripting via OpenTSDB Data Source
An attacker can trigger a Cross Site Scripting via OpenTSDB Data Source of Grafana, in order to run JavaScript code in the context of the web site...
Centreon Web: code execution via displayServiceStatus.php
An attacker can use a vulnerability via displayServiceStatus.php of Centreon Web, in order to run code...
QEMU: spoofing via ARM Weak Signature Generation
An attacker can create spoofed data via ARM Weak Signature Generation of QEMU, in order to deceive the victim...
Microsoft Edge Chromium: privilege escalation via Feedback Extension
An attacker can bypass restrictions via Feedback Extension of Microsoft Edge Chromium, in order to escalate his privileges...
PowerDNS Recursor: overload via NXNSAttack On Recursive Resolvers
An attacker can trigger an overload via NXNSAttack On Recursive Resolvers of PowerDNS Recursor, in order to trigger a denial of service...
PowerDNS Recursor: spoofing via DNSSEC Signatures Bypass
An attacker can create spoofed data via DNSSEC Signatures Bypass of PowerDNS Recursor, in order to deceive the victim...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Cisco Unified Contact Center Express: code execution via Java Deserialization
An attacker can use a vulnerability via Java Deserialization of Cisco Unified Contact Center Express, in order to run code...
LibreSSL: denial of service via Disabled Peer Verification
An attacker can trigger a fatal error via Disabled Peer Verification of LibreSSL, in order to trigger a denial of service...
Kubernetes: vulnerability via Debian Iptables/Base
A vulnerability via Debian Iptables/Base of Kubernetes was announced...
abcm2ps: buffer overflow via get_key
An attacker can trigger a buffer overflow via get_key() of abcm2ps, in order to trigger a denial of service, and possibly to run code...
abcm2ps: buffer overflow via delayed_output
An attacker can trigger a buffer overflow via delayed_output() of abcm2ps, in order to trigger a denial of service, and possibly to run code...
Drupal Core 7: open redirect via drupal_goto
An attacker can deceive the user via drupal_goto() of Drupal Core 7, in order to redirect him to a malicious site...
Apache Tomcat: code execution via PersistenceManager
An attacker can use a vulnerability via PersistenceManager of Apache Tomcat, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1025 1026 1027 1028 1029 1030 1031 1032 1033 1035 1037 1038 1039 1040 1041 1042 1043 1044 1045 1047