The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Electrum: information disclosure via Phishing
An attacker can bypass access restrictions to data via Phishing of Electrum, in order to obtain sensitive information...
Horde Image: code execution via Text Method
An attacker can use a vulnerability via Text Method of Horde Image, in order to run code...
HAProxy: out-of-bounds memory reading via dns_validate_dns_response
An attacker can force a read at an invalid address via dns_validate_dns_response() of HAProxy, in order to trigger a denial of service, or to obtain sensitive information...
BusyBox: out-of-bounds memory reading via DHCP_SUBNET
An attacker can force a read at an invalid address via DHCP_SUBNET of BusyBox, in order to trigger a denial of service, or to obtain sensitive information...
BusyBox: out-of-bounds memory reading via udhcp_get_option
An attacker can force a read at an invalid address via udhcp_get_option() of BusyBox, in order to trigger a denial of service, or to obtain sensitive information...
systemd: memory corruption via alloca
An attacker can trigger a memory corruption via alloca() of systemd, in order to trigger a denial of service, and possibly to run code...
Junos Space: file upload via Device Image
An attacker can upload a malicious file via Device Image on Junos Space, in order for example to upload a Trojan...
Junos Space: denial of service via Device Delete
An attacker can trigger a fatal error via Device Delete of Junos Space, in order to trigger a denial of service...
Junos OS SRX: privilege escalation via Deleted Dynamic VPN Users
An attacker can bypass restrictions via Deleted Dynamic VPN Users of Junos OS SRX, in order to escalate his privileges...
Junos OS: denial of service via J-Flow
An attacker can trigger a fatal error via J-Flow of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via PIM
An attacker can send malicious PIM packets to Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via VPLS PE BGP
An attacker can trigger a fatal error via VPLS PE BGP of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via Out Of Band Management Interface
An attacker can trigger a fatal error via Out Of Band Management Interface of Junos OS, in order to trigger a denial of service...
Junos OS SRX: denial of service via HTTP Traffic
An attacker can trigger a fatal error via HTTP Traffic of Junos OS SRX, in order to trigger a denial of service...
Junos OS EX: denial of service via High Disk I/O Operations
An attacker can trigger a fatal error via High Disk I/O Operations of Junos OS EX, in order to trigger a denial of service...
Junos OS: denial of service via FXPC
An attacker can trigger a fatal error via FXPC of Junos OS, in order to trigger a denial of service...
Junos OS EX/QFX: privilege escalation via Stateless Firewall IPv6 Extension Headers
An attacker can bypass restrictions via Stateless Firewall IPv6 Extension Headers of Junos OS EX/QFX, in order to escalate his privileges...
Junos OS vMX: information disclosure via Predictable IP ID
An attacker can bypass access restrictions to data via Predictable IP ID of Junos OS vMX, in order to obtain sensitive information...
Junos OS: denial of service via BGP Flowspec
An attacker can trigger a fatal error via BGP Flowspec of Junos OS, in order to trigger a denial of service...
Junos OS EX Series: privilege escalation via Stateless Firewall Filter
An attacker can bypass restrictions via Stateless Firewall Filter of Junos OS EX Series, in order to escalate his privileges...
Junos OS MX Series: infinite loop via bbe-smgd
An attacker can trigger an infinite loop via bbe-smgd of Junos OS MX Series, in order to trigger a denial of service...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
beep: denial of service via File Name Control
An attacker can trigger a fatal error via File Name Control of beep, in order to trigger a denial of service...
FreeBSD: denial of service via kqueue
An attacker can trigger a fatal error via kqueue of FreeBSD, in order to trigger a denial of service...
Drupal Provision: file reading
A local attacker can read a file of Drupal Provision, in order to obtain sensitive information...
Drupal Aegir HTTPS: file reading
A local attacker can read a file of Drupal Aegir HTTPS, in order to obtain sensitive information...
Drupal Phone Field: SQL injection
An attacker can use a SQL injection of Drupal Phone Field, in order to read or alter data...
libcaca: six vulnerabilities
An attacker can use several vulnerabilities of libcaca...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 888 889 890 891 892 893 894 895 896 898 900 901 902 903 904 905 906 907 908 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127