The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenLDAP: assertion error via issuerAndThisUpdateCheck
An attacker can force an assertion error via issuerAndThisUpdateCheck() of OpenLDAP, in order to trigger a denial of service...
Linux kernel: buffer overflow via __cgroup_bpf_run_filter_getsockopt
An attacker can trigger a buffer overflow via __cgroup_bpf_run_filter_getsockopt() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Apereo CAS Server: privilege escalation via Google Authenticator Accounts
An attacker can bypass restrictions via Google Authenticator Accounts of Apereo CAS Server, in order to escalate his privileges...
SPIP: code execution
An attacker can use a vulnerability of SPIP, in order to run code...
xterm: denial of service via UTF-8 Character Sequence
An attacker can trigger a fatal error via UTF-8 Character Sequence of xterm, in order to trigger a denial of service...
Adminer: information disclosure via Error Page SSRF
An attacker can bypass access restrictions to data via Error Page SSRF of Adminer, in order to obtain sensitive information...
Jasper: NULL pointer dereference via jp2_decode
An attacker can force a NULL pointer to be dereferenced via jp2_decode() of Jasper, in order to trigger a denial of service...
Jasper: out-of-bounds memory reading via jp2_decode
An attacker can force a read at an invalid address via jp2_decode() of Jasper, in order to trigger a denial of service, or to obtain sensitive information...
Python Cryptography: integer overflow via Multi-GB Values Symmetrically Encryption
An attacker can trigger an integer overflow via Multi-GB Values Symmetrically Encryption of Python Cryptography, in order to trigger a denial of service, and possibly to run code...
McAfee Endpoint Security: five vulnerabilities
An attacker can use several vulnerabilities of McAfee Endpoint Security...
PostgreSQL: information disclosure via Single-column SELECT Privilege
An attacker can bypass access restrictions to data via Single-column SELECT Privilege of PostgreSQL, in order to obtain sensitive information...
PostgreSQL: information disclosure via Partition Constraint
An attacker can bypass access restrictions to data via Partition Constraint of PostgreSQL, in order to obtain sensitive information...
GNOME gnome-autoar: directory traversal via autoar-extractor.c
An attacker can traverse directories via autoar-extractor.c of GNOME gnome-autoar, in order to create a file outside the service root path...
Netty: information disclosure via Temporary File
An attacker can bypass access restrictions to data via Temporary File of Netty, in order to obtain sensitive information...
F5 BIG-IP: privilege escalation via IControl REST Race Condition
An attacker can bypass restrictions via IControl REST Race Condition of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP AFM: Cross Site Scripting via Configuration Utility
An attacker can trigger a Cross Site Scripting via Configuration Utility of F5 BIG-IP AFM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP APM: overload via VPN Traffic
An attacker can trigger an overload via VPN Traffic of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP DNS/GTM: buffer overflow via Big3d Agent
An attacker can trigger a buffer overflow via Big3d Agent of F5 BIG-IP DNS/GTM, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP ASM: data transit via Cookies Signature Checks
An attacker can bypass filtering rules via Cookies Signature Checks of F5 BIG-IP ASM, in order to transmit malicious data...
F5 BIG-IP: denial of service via Large Traffic Bursts
An attacker can trigger a fatal error via Large Traffic Bursts of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: memory corruption via IRules LX JSON Parser
An attacker can trigger a memory corruption via IRules LX JSON Parser of F5 BIG-IP, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: denial of service via HTTP Session
An attacker can trigger a fatal error via HTTP Session of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: executing DLL code via Client Troubleshooting Utility
An attacker can create a malicious Client Troubleshooting Utility DLL, and then put it in the current directory of F5 BIG-IP APM, in order to execute code...
F5 BIG-IP: Man-in-the-Middle via TLS Master Secret Negotiation
An attacker can act as a Man-in-the-Middle via TLS Master Secret Negotiation on F5 BIG-IP, in order to read or write data in the session...
F5 BIG-IP ASM: overload via WebSocket JSON Payloads
An attacker can trigger an overload via WebSocket JSON Payloads of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP: Cross Site Scripting via iControl REST
An attacker can trigger a Cross Site Scripting via iControl REST of F5 BIG-IP, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1100 1101 1102 1103 1104 1105 1106 1107 1108 1110 1112 1113 1114