The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mosquitto: privilege escalation via SIGHUP Default Configuration
An attacker can bypass restrictions via SIGHUP Default Configuration of Mosquitto, in order to escalate his privileges...
Mosquitto: memory leak via CONNECT Packet
An attacker can create a memory leak via CONNECT Packet of Mosquitto, in order to trigger a denial of service...
Mercurial: privilege escalation via Protocol Server
An attacker can bypass restrictions via Protocol Server of Mercurial, in order to escalate his privileges...
Joomla Rapicode: code execution
An attacker can use a vulnerability of Joomla Rapicode, in order to run code...
aubio: denial of service
An attacker can generate a fatal error of aubio, in order to trigger a denial of service...
links: out-of-bounds memory reading via UTF-8 Data
An attacker can force a read at an invalid address via UTF-8 Data of links, in order to trigger a denial of service, or to obtain sensitive information...
pfSense: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of pfSense, in order to run JavaScript code in the context of the web site...
pfSense: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of pfSense, in order to force the victim to perform operations...
WordPress WP Security Audit Log: information disclosure
An attacker can bypass access restrictions to data of WordPress WP Security Audit Log, in order to obtain sensitive information...
Joomla JS Jobs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla JS Jobs, in order to run JavaScript code in the context of the web site...
Windows: privilege escalation via Meltdown Patch
An attacker can bypass restrictions via Meltdown Patch of Windows, in order to escalate his privileges...
CA Workload Automation AE: SQL injection
An attacker can use a SQL injection of CA Workload Automation AE, in order to read or alter data...
Ruby: six vulnerabilities
An attacker can use several vulnerabilities of Ruby...
Python: buffer overflow via Windows os.symlink
An attacker can generate a buffer overflow via Windows os.symlink of Python, in order to trigger a denial of service, and possibly to run code...
Python: denial of service via Poplib Regular Expressions
An attacker can generate a fatal error via Poplib Regular Expressions of Python, in order to trigger a denial of service...
Python: denial of service via Difflib Regular Expressions
An attacker can generate a fatal error via Difflib Regular Expressions of Python, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via get_acl
An attacker can force a NULL pointer to be dereferenced via get_acl() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via ext4_xattr_inode_hash
An attacker can force a NULL pointer to be dereferenced via ext4_xattr_inode_hash() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: out-of-bounds memory reading via ext4_valid_block_bitmap
An attacker can force a read at an invalid address via ext4_valid_block_bitmap() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: NULL pointer dereference via ext4_process_freed_data
An attacker can force a NULL pointer to be dereferenced via ext4_process_freed_data() of the Linux kernel, in order to trigger a denial of service...
IBM GSKit: three vulnerabilities
An attacker can use several vulnerabilities of IBM GSKit...
UnboundID LDAP SDK for Java: privilege escalation via Empty Password
An attacker can bypass restrictions via Empty Password of UnboundID LDAP SDK for Java, in order to escalate his privileges...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Apache Tomcat: code execution via Documented CGI Search Algorithm
An attacker can use a vulnerability via Documented CGI Search Algorithm of Apache Tomcat, in order to run code...
PHP: information disclosure via Dumpable FPM Child Process
An attacker can bypass access restrictions to data via Dumpable FPM Child Process of PHP, in order to obtain sensitive information...
Node Core: code execution via Inspector DNS Rebinding
An attacker can use a vulnerability via Inspector DNS Rebinding of Node Core, in order to run code...
Node Core: vulnerability via HTTP Content-Length Spaces
A vulnerability via HTTP Content-Length Spaces of Node Core was announced...
Node Core: denial of service via Path Regular Expression
An attacker can generate a fatal error via Path Regular Expression of Node Core, in order to trigger a denial of service...
Synology Calendar: privilege escalation
An attacker can bypass restrictions of Synology Calendar, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 805 806 807 808 809 810 811 812 813 815 817 818 819 820 821 822 823 824 825 841 861 881 901 921 941 961 981 1001 1021 1041 1053