The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SAP: multiples vulnerabilities of February 2019
An attacker can use several vulnerabilities of SAP products...
runc: code execution via FS Descriptors Container Escape
An attacker can use a vulnerability via FS Descriptors Container Escape of runc, in order to run code...
libu2f-host: buffer overflow
An attacker can trigger a buffer overflow of libu2f-host, in order to trigger a denial of service, and possibly to run code...
Poppler: out-of-bounds memory reading via XRef-getEntry
An attacker can force a read at an invalid address via XRef::getEntry() of Poppler, in order to trigger a denial of service, or to obtain sensitive information...
LibTIFF: NULL pointer dereference via TIFFWriteDirectoryTagTransfer
An attacker can force a NULL pointer to be dereferenced via TIFFWriteDirectoryTagTransfer() of LibTIFF, in order to trigger a denial of service...
Zope2: information disclosure via Fields Password String
An attacker can bypass access restrictions to data via Fields Password String of Zope2, in order to obtain sensitive information...
BuildBot: open redirect via CRLF Sequences
An attacker can deceive the user via CRLF Sequences of BuildBot, in order to redirect him to a malicious site...
Slurm: integer overflow
An attacker can trigger an integer overflow of Slurm, in order to trigger a denial of service, and possibly to run code...
Mosquitto MQTT: three vulnerabilities
An attacker can use several vulnerabilities of Mosquitto MQTT...
rsyslog: denial of service via Imtcp Octet-Counted TCP Framing
An attacker can trigger a fatal error via Imtcp Octet-Counted TCP Framing of rsyslog, in order to trigger a denial of service...
Cisco Aironet Active Sensor: denial of service via Static Credentials Reboot
An attacker can trigger a fatal error via Static Credentials Reboot of Cisco Aironet Active Sensor, in order to trigger a denial of service...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
libarchive: infinite loop via parse_rockridge
An attacker can trigger an infinite loop via parse_rockridge() of libarchive, in order to trigger a denial of service...
libarchive: out-of-bounds memory reading via 7zip header_bytes
An attacker can force a read at an invalid address via 7zip header_bytes() of libarchive, in order to trigger a denial of service, or to obtain sensitive information...
Node.js Modules: four vulnerabilities via Prototype Pollution
An attacker can use several vulnerabilities via Prototype Pollution of Node.js Modules...
Stormshield Network Security: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Stormshield Network Security, in order to run JavaScript code in the context of the web site...
Cisco Web Security Appliance: privilege escalation via Decryption Policy Bypass
An attacker can bypass restrictions via Decryption Policy Bypass of Cisco Web Security Appliance, in order to escalate his privileges...
NetBSD: information disclosure via Kernel Memory Leaks
A local attacker can read a memory fragment of NetBSD, in order to obtain sensitive information...
Drupal Acquia Connector: privilege escalation
An attacker can bypass restrictions of Drupal Acquia Connector, in order to escalate his privileges...
Drupal Login Alert: privilege escalation
An attacker can bypass restrictions of Drupal Login Alert, in order to escalate his privileges...
Drupal Public Download Count: open redirect
An attacker can deceive the user of Drupal Public Download Count, in order to redirect him to a malicious site...
Rack: infinite loop via Multipart Parser
An attacker can trigger an infinite loop via Multipart Parser of Rack, in order to trigger a denial of service...
Python GnuPG: vulnerability via Passphrases Control Characters
A vulnerability via Passphrases Control Characters of Python GnuPG was announced...
netmask: buffer overflow
An attacker can trigger a buffer overflow of netmask, in order to trigger a denial of service, and possibly to run code...
Apache Thrift Java Client: privilege escalation via SASL Negotiation Bypass
An attacker can bypass restrictions via SASL Negotiation Bypass of Apache Thrift Java Client, in order to escalate his privileges...
Mumble: denial of service via Concurrent Requests
An attacker can trigger a fatal error via Concurrent Requests of Mumble, in order to trigger a denial of service...
OSSEC: multiple vulnerabilities
An attacker can use several vulnerabilities of OSSEC...
WordPress Parallax Scroll: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Parallax Scroll, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 896 897 898 899 900 901 902 903 904 906 908 909 910 911 912 913 914 915 916 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127