The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SAP: multiple vulnerabilities of February 2021
An attacker can use several vulnerabilities of SAP products...
SIMATIC: information disclosure via Password Protected Pictures
An attacker can bypass access restrictions to data via Password Protected Pictures of SIMATIC, in order to obtain sensitive information...
IBM Spectrum Protect Plus: denial of service via Data Injection/Parameter
An attacker can trigger a fatal error via Data Injection/Parameter of IBM Spectrum Protect Plus, in order to trigger a denial of service...
Node.js systeminformation: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js systeminformation, in order to escalate his privileges...
Golang: denial of service via crypto/ssh
An attacker can trigger a fatal error via crypto/ssh of Golang, in order to trigger a denial of service...
OTRS Help Desk: Cross Site Scripting via CKEditor
An attacker can trigger a Cross Site Scripting via CKEditor of OTRS Help Desk, in order to run JavaScript code in the context of the web site...
OTRS Help Desk: information disclosure via PDF Export
An attacker can bypass access restrictions to data via PDF Export of OTRS Help Desk, in order to obtain sensitive information...
pngcheck: buffer overflow via Invalid MNG PPLT Chunk
An attacker can trigger a buffer overflow via Invalid MNG PPLT Chunk of pngcheck, in order to trigger a denial of service, and possibly to run code...
pngcheck: buffer overflow via Large MNG LOOP Chunk
An attacker can trigger a buffer overflow via Large MNG LOOP Chunk of pngcheck, in order to trigger a denial of service, and possibly to run code...
ConnMan: buffer overflow
An attacker can trigger a buffer overflow of ConnMan, in order to trigger a denial of service, and possibly to run code...
ConnMan: information disclosure
An attacker can bypass access restrictions to data of ConnMan, in order to obtain sensitive information...
OpenJPEG: memory corruption via t2.c
An attacker can trigger a memory corruption via t2.c of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
JBoss RESTEasy: information disclosure via WebApplicationException
An attacker can bypass access restrictions to data via WebApplicationException of JBoss RESTEasy, in order to obtain sensitive information...
Adminer: Cross Site Scripting via URL Parameters Encoding
An attacker can trigger a Cross Site Scripting via URL Parameters Encoding of Adminer, in order to run JavaScript code in the context of the web site...
Aruba/HPE Switch: denial of service via Management Interface
An attacker can trigger a fatal error via Management Interface of Aruba/HPE Switch, in order to trigger a denial of service...
QEMU: denial of service via VirtFS Directory Sharing
An attacker, inside a guest system, can trigger a fatal error via VirtFS Directory Sharing of QEMU, in order to trigger a denial of service on the host system...
Nextcloud Server: three vulnerabilities
An attacker can use several vulnerabilities of Nextcloud Server...
Linux kernel: use after free via io_grab_files
An attacker can force the usage of a freed memory area via io_grab_files() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via tun_get_user
An attacker can force the usage of a freed memory area via tun_get_user() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via psi_write
An attacker can trigger a buffer overflow via psi_write() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
gdisk: buffer overflow via ReadLogicalParts
An attacker can trigger a buffer overflow via ReadLogicalParts() of gdisk, in order to trigger a denial of service, and possibly to run code...
gdisk: buffer overflow via LoadPartitionTable
An attacker can trigger a buffer overflow via LoadPartitionTable() of gdisk, in order to trigger a denial of service, and possibly to run code...
ZeroMQ: four vulnerabilities
An attacker can use several vulnerabilities of ZeroMQ...
wpa_supplicant: memory corruption via Wi-Fi Direct
An attacker can trigger a memory corruption via Wi-Fi Direct of wpa_supplicant, in order to trigger a denial of service, and possibly to run code...
GNU binutils: read-write access via smart_rename
An attacker can bypass access restrictions via smart_rename() of GNU binutils, in order to read or alter data...
Python Pygments: overload via SMLLexer
An attacker can trigger an overload via SMLLexer of Python Pygments, in order to trigger a denial of service...
Jasper: out-of-bounds memory reading via jp2_decode
An attacker can force a read at an invalid address via jp2_decode() of Jasper, in order to trigger a denial of service, or to obtain sensitive information...
Privoxy: multiple vulnerabilities
An attacker can use several vulnerabilities of Privoxy...
Firefox: buffer overflow via Compressed Textures Depth Pitch
An attacker can trigger a buffer overflow via Compressed Textures Depth Pitch of Firefox, in order to trigger a denial of service, and possibly to run code...
Microsoft Edge Chromium: code execution via Copy/Paste Javascript
An attacker can use a vulnerability via Copy/Paste Javascript of Microsoft Edge Chromium, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1098 1099 1100 1101 1102 1103 1104 1105 1106 1108 1110 1111 1112 1113 1114