The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Ruby websocket-extensions: denial of service via Regex Backtracking
An attacker can trigger a fatal error via Regex Backtracking of Ruby websocket-extensions, in order to trigger a denial of service...
cURL: information disclosure via CURLOPT_CONNECT_ONLY
An attacker can bypass access restrictions to data via CURLOPT_CONNECT_ONLY of cURL, in order to obtain sensitive information...
libxml2: buffer overflow
An attacker can trigger a buffer overflow of libxml2, in order to trigger a denial of service, and possibly to run code...
libxml2: buffer overflow
An attacker can trigger a buffer overflow of libxml2, in order to trigger a denial of service, and possibly to run code...
libxml2: buffer overflow
An attacker can trigger a buffer overflow of libxml2, in order to trigger a denial of service, and possibly to run code...
Chrome: buffer overflow via SwiftShader
An attacker can trigger a buffer overflow via SwiftShader of Chrome, in order to trigger a denial of service, and possibly to run code...
Elasticsearch: information disclosure via Scrolling Search Field Level Security
An attacker can bypass access restrictions to data via Scrolling Search Field Level Security of Elasticsearch, in order to obtain sensitive information...
Keycloak: denial of service via Large Simultaneous Content-Length Requests
An attacker can trigger a fatal error via Large Simultaneous Content-Length Requests of Keycloak, in order to trigger a denial of service...
Keycloak: privilege escalation via Admin Console Missing Security Headers
An attacker can bypass restrictions via Admin Console Missing Security Headers of Keycloak, in order to escalate his privileges...
RabbitMQ Server: privilege escalation via Windows Binary Planting
An attacker can bypass restrictions via Windows Binary Planting of RabbitMQ Server, in order to escalate his privileges...
GNOME Shell: information disclosure via Password Visible On Logout
An attacker can bypass access restrictions to data via Password Visible On Logout of GNOME Shell, in order to obtain sensitive information...
wob: vulnerability
A vulnerability of wob was announced...
Node.js url-regex: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Node.js url-regex, in order to trigger a denial of service...
WildFly: privilege escalation via EmbeddedManagedProcess API TCCL Setting
An attacker can bypass restrictions via EmbeddedManagedProcess API TCCL Setting of WildFly, in order to escalate his privileges...
WildFly: privilege escalation via FORM Authentication Session Fixation
An attacker can bypass restrictions via FORM Authentication Session Fixation of WildFly, in order to escalate his privileges...
Hibernate Validator: privilege escalation via Message Interpolation Processor
An attacker can bypass restrictions via Message Interpolation Processor of Hibernate Validator, in order to escalate his privileges...
Undertow: information disclosure via HTTP Requests Invalid Characters
An attacker can bypass access restrictions to data via HTTP Requests Invalid Characters of Undertow, in order to obtain sensitive information...
WildFly: privilege escalation via Alternative Protection Domain
An attacker can bypass restrictions via Alternative Protection Domain of WildFly, in order to escalate his privileges...
Undertow: information disclosure via Field Name Parsing
An attacker can bypass access restrictions to data via Field Name Parsing of Undertow, in order to obtain sensitive information...
Qt: out-of-bounds memory reading via read_xbm_body
An attacker can force a read at an invalid address via read_xbm_body() of Qt, in order to trigger a denial of service, or to obtain sensitive information...
LibEtPan: read-write access via Begin TLS Response
An attacker can bypass access restrictions via Begin TLS Response of LibEtPan, in order to read or alter data...
HtmlUnit: code execution via Invalid Rhino Initialization
An attacker can use a vulnerability via Invalid Rhino Initialization of HtmlUnit, in order to run code...
GNOME Balsa: NULL pointer dereference via imap_mbox_connect
An attacker can force a NULL pointer to be dereferenced via imap_mbox_connect() of GNOME Balsa, in order to trigger a denial of service...
PlRPC: code execution via Deserialized Request
An attacker can use a vulnerability via Deserialized Request of PlRPC, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1051 1052 1053 1054 1055 1056 1057 1058 1059 1061 1063 1064 1065 1066 1067 1068 1069 1070 1071 1080