The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Undertow: information disclosure via ByteBuffer Flushing
An attacker can bypass access restrictions to data via ByteBuffer Flushing of Undertow, in order to obtain sensitive information...
WildFly: Cross Site Scripting via JBoss Management Console
An attacker can trigger a Cross Site Scripting via JBoss Management Console of WildFly, in order to run JavaScript code in the context of the web site...
systemd: buffer overflow via D-Bus Message
An attacker can trigger a buffer overflow via D-Bus Message of systemd, in order to trigger a denial of service, and possibly to run code...
Bluetooth Firmware: information disclosure via Weak Elliptic Curve Parameters
An attacker can bypass access restrictions to data via Weak Elliptic Curve Parameters of Bluetooth Firmware, in order to obtain sensitive information...
gSOAP: denial of service via WITH_COOKIES
An attacker can trigger a fatal error via WITH_COOKIES of gSOAP, in order to trigger a denial of service...
Node.js braces: denial of service via Regular Expression
An attacker can trigger a fatal error via Regular Expression of Node.js braces, in order to trigger a denial of service...
Node.js clean-css: denial of service via Regular Expression
An attacker can trigger a fatal error via Regular Expression of Node.js clean-css, in order to trigger a denial of service...
PSPP: buffer overflow via read_bytes_internal
An attacker can trigger a buffer overflow via read_bytes_internal() of PSPP, in order to trigger a denial of service, and possibly to run code...
QEMU: out-of-bounds memory reading via i2c_ddc_rx
An attacker can force a read at an invalid address via i2c_ddc_rx() of QEMU, in order to trigger a denial of service, or to obtain sensitive information...
Elfutils: two vulnerabilities
An attacker can use several vulnerabilities of Elfutils...
Elfutils: four vulnerabilities
An attacker can use several vulnerabilities of Elfutils...
Python Markdown: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Python Markdown, in order to run JavaScript code in the context of the web site...
PoDoFo: denial of service via crop_page
An attacker can trigger a fatal error via crop_page() of PoDoFo, in order to trigger a denial of service...
KDE KAuth: privilege escalation
An attacker can bypass restrictions of KDE KAuth, in order to escalate his privileges...
GSI OpenSSH: privilege escalation via PermitPAMUserChange
An attacker can bypass restrictions via PermitPAMUserChange of GSI OpenSSH, in order to escalate his privileges...
Thunderbird: information disclosure via S/MIME Signature Spoofing
An attacker can bypass access restrictions to data via S/MIME Signature Spoofing of Thunderbird, in order to obtain sensitive information...
libexif: infinite loop via XIF_IFD_INTEROPERABILITY
An attacker can trigger an infinite loop via XIF_IFD_INTEROPERABILITY of libexif, in order to trigger a denial of service...
Node.js node-os-utils: code execution
An attacker can use a vulnerability of Node.js node-os-utils, in order to run code...
Node.js url-relative: denial of service
An attacker can trigger a fatal error of Node.js url-relative, in order to trigger a denial of service...
Node.js lodash: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js lodash, in order to escalate his privileges...
Microsoft Visual Studio: vulnerabilities of February 2019
An attacker can use several vulnerabilities of Microsoft products...
Skia: buffer overflow via Canvas 2D
An attacker can trigger a buffer overflow via Canvas 2D of Skia, in order to trigger a denial of service, and possibly to run code...
Drupal Entity Registration: privilege escalation
An attacker can bypass restrictions of Drupal Entity Registration, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 898 899 900 901 902 903 904 905 906 908 910 911 912 913 914 915 916 917 918 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1141 1148