The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FortiOS: information disclosure via fnsysctl
An attacker can bypass access restrictions to data via fnsysctl of FortiOS, in order to obtain sensitive information...
Node Core: information disclosure via Fill Value Encoding
A local attacker can read a memory fragment via Fill Value Encoding of Node Core, in order to obtain sensitive information...
Node Core: information disclosure via SSL_read
An attacker can bypass access restrictions to data via SSL_read() of Node Core, in order to obtain sensitive information...
WordPress Crowd Ideas: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Crowd Ideas, in order to run JavaScript code in the context of the web site...
Synology Router Manager: directory traversal
An attacker can traverse directories of Synology Router Manager, in order to create a file outside the service root path...
Synology DiskStation Manager: directory traversal
An attacker can traverse directories of Synology DiskStation Manager, in order to create a file outside the service root path...
Synology File Station: directory traversal
An attacker can traverse directories of Synology File Station, in order to create a file outside the service root path...
Synology Calendar: privilege escalation
An attacker can bypass restrictions of Synology Calendar, in order to escalate his privileges...
OpenBSD: denial of service via MPLS
An attacker can send malicious MPLS packets to OpenBSD, in order to trigger a denial of service...
Fedora ARM Installer: privilege escalation via /tmp Mount
An attacker can bypass restrictions via /tmp Mount of Fedora ARM Installer, in order to escalate his privileges...
Docker Moby: denial of service via gzip decompression
An attacker can consume all disk storage via the unlimited decompression of a Gzip file by Docker Moby, in order to trigger a denial of service...
WildMidi: four vulnerabilities
An attacker can use several vulnerabilities of WildMidi...
transfig: memory corruption via fig2dev
An attacker can generate a memory corruption via fig2dev of transfig, in order to trigger a denial of service, and possibly to run code...
CouchDB: code execution via Remote Configuration Options
An attacker can use a vulnerability via Remote Configuration Options of CouchDB, in order to run code...
CouchDB: privilege escalation via _users
An attacker can bypass restrictions via _users of CouchDB, in order to escalate his privileges...
BorgBackup: privilege escalation via Borg SSH
An attacker can bypass restrictions via Borg SSH of BorgBackup, in order to escalate his privileges...
collectd: use after free via SNMP Plugin
An attacker can force the usage of a freed memory area via SNMP Plugin of collectd, in order to trigger a denial of service, and possibly to run code...
xrdp: buffer overflow via scp_v0s_accept
An attacker can generate a buffer overflow via scp_v0s_accept() of xrdp, in order to trigger a denial of service, and possibly to run code...
Open Build Service: privilege escalation via rpmbuild
An attacker can bypass restrictions via rpmbuild of Open Build Service, in order to escalate his privileges...
Open Build Service: write access via extractbuild
An attacker can bypass access restrictions via extractbuild of Open Build Service, in order to alter data...
Open Build Service: write access via cpio
An attacker can bypass access restrictions via cpio of Open Build Service, in order to alter data...
Linux kernel: privilege escalation via bnep_add_connection
An attacker can bypass restrictions via bnep_add_connection() of the Linux kernel, in order to escalate his privileges...
FortiClient: privilege escalation via VPN Credentials
An attacker can bypass restrictions via VPN Credentials of FortiClient, in order to escalate his privileges...
WordPress File Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress File Manager, in order to run JavaScript code in the context of the web site...
Firefox, Thunderbird: buffer overflow via ANGLE Library Using Direct 3D 9
An attacker can generate a buffer overflow via ANGLE Library Using Direct 3D 9 of Firefox/Thunderbird, in order to trigger a denial of service, and possibly to run code...
libsndfile: out-of-bounds memory reading via d2ulaw_array
An attacker can force a read at an invalid address via d2ulaw_array() of libsndfile, in order to trigger a denial of service, or to obtain sensitive information...
libsndfile: out-of-bounds memory reading via d2alaw_array
An attacker can force a read at an invalid address via d2alaw_array() of libsndfile, in order to trigger a denial of service, or to obtain sensitive information...
RHEL: privilege escalation via PostgreSQL PGLOG
An attacker can bypass restrictions via PostgreSQL PGLOG of RHEL, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 771 772 773 774 775 776 777 778 779 781 783 784 785 786 787 788 789 790 791 801 821 841 861 881 901 921 941 961 981 1001 1021 1023