The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
GStreamer Base Plugins: information disclosure via ID3v2 Tag Parsing
An attacker can bypass access restrictions to data via ID3v2 Tag Parsing of GStreamer Base Plugins, in order to obtain sensitive information...
OpenBSD: buffer overflow via Vmd Guest Virtio Drivers
An attacker can trigger a buffer overflow via Vmd Guest Virtio Drivers of OpenBSD, in order to trigger a denial of service, and possibly to run code...
Kubernetes kube-apiserver: information disclosure via Pod Traffic Redirection
An attacker can bypass access restrictions to data via Pod Traffic Redirection of Kubernetes kube-apiserver, in order to obtain sensitive information...
libX11: code execution via XLookupColor Protocol Command Injection
An attacker can use a vulnerability via XLookupColor() Protocol Command Injection of libX11, in order to run code...
Node.js react-native-fast-image: information disclosure via Signing Credentials
An attacker can bypass access restrictions to data via Signing Credentials of Node.js react-native-fast-image, in order to obtain sensitive information...
Node.js rollup-plugin-serve: directory traversal via readFile
An attacker can traverse directories via readFile of Node.js rollup-plugin-serve, in order to read a file outside the service root path...
Node.js devcert: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Node.js devcert, in order to run code...
Node.js jspdf: Cross Site Scripting via Html Method
An attacker can trigger a Cross Site Scripting via Html Method of Node.js jspdf, in order to run JavaScript code in the context of the web site...
Node.js fastify-csrf: Cross Site Request Forgery via Cookie Double Submit
An attacker can trigger a Cross Site Request Forgery via Cookie Double Submit of Node.js fastify-csrf, in order to force the victim to perform operations...
Caribou: privilege escalation via Screen-locking Bypass
An attacker can bypass restrictions via Screen-locking Bypass of Caribou, in order to escalate his privileges...
Thunderbird: two vulnerabilities via OpenPGP
An attacker can use several vulnerabilities via OpenPGP of Thunderbird...
Apache Nutch: external XML entity injection via DmozParser
An attacker can transmit malicious XML data via DmozParser to Apache Nutch, in order to read a file, scan sites, or trigger a denial of service...
Apache XMLBeans: external XML entity injection
An attacker can transmit malicious XML data to Apache XMLBeans, in order to read a file, scan sites, or trigger a denial of service...
Node.js websocket-extensions: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Node.js websocket-extensions, in order to trigger a denial of service...
DjVuLibre: four vulnerabilities
An attacker can use several vulnerabilities of DjVuLibre...
Eventlet: overload via Large Websocket Frames
An attacker can trigger an overload via Large Websocket Frames of Eventlet, in order to trigger a denial of service...
Centreon Web: SQL injection via Additional User Information
An attacker can use a SQL injection via Additional User Information of Centreon Web, in order to read or alter data...
Adminer: Cross Site Scripting via doc_link
An attacker can trigger a Cross Site Scripting via doc_link of Adminer, in order to run JavaScript code in the context of the web site...
Pulse Connect Secure: buffer overflow via SMB Shares Browsing
An attacker can trigger a buffer overflow via SMB Shares Browsing of Pulse Connect Secure, in order to trigger a denial of service, and possibly to run code...
Please: three vulnerabilities
An attacker can use several vulnerabilities of Please...
Brocade Fabric OS: memory leak via Secnotify Process
An attacker can create a memory leak via Secnotify Process of Brocade Fabric OS, in order to trigger a denial of service...
Brocade Fabric OS: denial of service via Security Scanning
An attacker can trigger a fatal error via Security Scanning of Brocade Fabric OS, in order to trigger a denial of service...
Brocade Fabric OS: information disclosure via WebApplication Debug
An attacker can bypass access restrictions to data via WebApplication Debug of Brocade Fabric OS, in order to obtain sensitive information...
Brocade Fabric OS: write access via History Command
An attacker can bypass access restrictions via History Command of Brocade Fabric OS, in order to alter files...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1130 1131 1132 1133 1134 1135 1136 1137 1138 1140 1142 1143 1144 1145 1146 1147 1148 1149 1150