The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Backup and Migrate: code execution
An attacker can use a vulnerability of Drupal Backup and Migrate, in order to run code...
gcab: buffer overflow
An attacker can generate a buffer overflow of gcab, in order to trigger a denial of service, and possibly to run code...
curl: two vulnerabilities
An attacker can use several vulnerabilities of libcurl...
Node Electron: code execution
An attacker can use a vulnerability of Node Electron, in order to inject a command line within the chromium arguments...
Mozilla Firefox: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox...
oVirt: "root" password disclosure via a log file
An attacker can read the log file created by hosted-engine-setup from oVirt, in order to get the root password...
libvpx: denial of service
An attacker can generate a fatal error of libvpx, in order to trigger a denial of service...
libtasn1: infinite loop
An attacker can generate an infinite loop of libtasn1, in order to trigger a denial of service...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Fortinet FortiOS: Cross Site Scripting via web proxy
An attacker can trigger a Cross Site Scripting via the web proxy of Fortinet FortiOS, in order to run JavaScript code in the context of the web site...
WordPress BuddyBoss Media: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress BuddyBoss Media, in order to run JavaScript code in the context of the web site...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
WordPress multiple themes: directory traversal
An attacker can traverse directories of several WordPress themes, in order to read a file outside the service root path...
Squid cache: denial of service
An attacker can generate a fatal error of Squid cache, in order to trigger a denial of service...
LibTIFF: denial of service
An attacker can trigger an overuse of resources in LibTIFF, in order to trigger a denial of service...
OpenSSH: NULL pointer dereference via a NEWKEYS message
An attacker can force a NULL pointer to be dereferenced in OpenSSH via an out of order NEWKEYS message, in order to trigger a denial of service...
Dnsmasq: denial of service via NSEC
An attacker can make Dnsmasq declare that a domain does not exist, because of an error in the signature check step, in order to trigger a denial of service...
ImageMagick: memory leak
An attacker can create a memory leak of ImageMagick, in order to trigger a denial of service...
openocd: Cross Site Scripting via POST commands
An attacker can trigger a Cross Site Scripting via POST commands sent to openocd, in order to run JavaScript code in the context of the web site...
QEMU: integer overflow via ROUND_UP
An attacker can generate an integer overflow via ROUND_UP() of QEMU, in order to trigger a denial of service...
Smarty: code execution
An attacker can use a vulnerability of Smarty, in order to run code...
F5 BIG-IP: Man-in-the-Middle via a wrong X.509 validation
An attacker can act as a Man-in-the-Middle againt F5 BIG-IP, in order to read or write data in the session...
Cisco ASR: shell command execution
An authenticated local attacker can run shell commands under the "root" system account on Cisco ASR, in order to raise its privileges...
rootsh: file reading via log
A local attacker can read the log files of rootsh, in order to get sensitive information...
keycloak-httpd-client-install: two vulnerabilities
An attacker can use several vulnerabilities of keycloak-httpd-client-install...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 785 786 787 788 789 790 791 792 793 795 797 798 799 800 801 802 803 804 805 821 841 861 881 901 921 941 961 981 1001 1013