The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Ikiwiki: information disclosure via Server-Side Request Forgery
An attacker can bypass access restrictions to data via Server-Side Request Forgery of Ikiwiki, in order to obtain sensitive information...
Asterisk: denial of service via SDP
An attacker can trigger a fatal error via SDP of Asterisk, in order to trigger a denial of service...
file: out-of-bounds memory reading via do_core_note
An attacker can force a read at an invalid address via do_core_note() of file, in order to trigger a denial of service, or to obtain sensitive information...
WordPress Smart Forms: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Smart Forms, in order to force the victim to perform operations...
Drupal Rabbit Hole: information disclosure
An attacker can bypass access restrictions to data of Drupal Rabbit Hole, in order to obtain sensitive information...
Drupal Facets: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Facets, in order to run JavaScript code in the context of the web site...
Drupal Context: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Context, in order to run JavaScript code in the context of the web site...
Drupal Path Breadcrumbs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Path Breadcrumbs, in order to run JavaScript code in the context of the web site...
Drupal Services: SQL injection
An attacker can use a SQL injection of Drupal Services, in order to read or alter data...
Wireshark: three vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
GPAC: multiple vulnerabilities
An attacker can use several vulnerabilities of GPAC...
GPAC: buffer overflow via gf_media_avc_read_sps
An attacker can trigger a buffer overflow via gf_media_avc_read_sps() of GPAC, in order to trigger a denial of service, and possibly to run code...
Linux kernel: out-of-bounds memory reading via SNMP NAT
An attacker can force a read at an invalid address via SNMP NAT of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Siemens SIMATIC WinCC OA: multiple vulnerabilities via WibuKey DRM
An attacker can use several vulnerabilities via WibuKey DRM of Siemens SIMATIC WinCC OA...
Exiv2: denial of service via Exiv2-Internal-TiffParserWorker-findPrimaryGroups
An attacker can trigger a fatal error via Exiv2::Internal::TiffParserWorker::findPrimaryGroups() of Exiv2, in order to trigger a denial of service...
Exiv2: out-of-bounds memory reading via PngChunk-readRawProfile
An attacker can force a read at an invalid address via PngChunk::readRawProfile() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
Exiv2: infinite loop via Exiv2-PsdImage-readMetadata
An attacker can trigger an infinite loop via Exiv2::PsdImage::readMetadata() of Exiv2, in order to trigger a denial of service...
Exiv2: out-of-bounds memory reading via Exiv2-IptcParser-decode
An attacker can force a read at an invalid address via Exiv2::IptcParser::decode() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
F5 BIG-IP: infinite loop via MPTCP
An attacker can trigger an infinite loop via MPTCP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: information disclosure via Enumerated Web Page
An attacker can bypass access restrictions to data via Enumerated Web Page of F5 BIG-IP APM, in order to obtain sensitive information...
F5 BIG-IP: denial of service via SSL Certificates
An attacker can trigger a fatal error via SSL Certificates of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: information disclosure via Debug Log Level
An attacker can bypass access restrictions to data via Debug Log Level of F5 BIG-IP APM, in order to obtain sensitive information...
F5 BIG-IP APM: Cross Site Scripting via Admin Web UI
An attacker can trigger a Cross Site Scripting via Admin Web UI of F5 BIG-IP APM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP, Junos Space: information disclosure via Chosen CBC Ciphertext
An attacker can bypass access restrictions to data via Chosen CBC Ciphertext of F5 BIG-IP or Junos Space, in order to obtain sensitive information...
Cloud Foundry CLI: information disclosure via verbose/trace/debugging Logs
An attacker can bypass access restrictions to data via verbose/trace/debugging Logs of Cloud Foundry CLI, in order to obtain sensitive information...
LDB: denial of service via Search Expressions
An attacker can trigger a fatal error via Search Expressions of LDB, in order to trigger a denial of service...
GNOME Keyring: information disclosure via PAM Module Login Credentials
An attacker can bypass access restrictions to data via PAM Module Login Credentials of GNOME Keyring, in order to obtain sensitive information...
OpenSSL 1.0.2: information disclosure via 0-byte Record Padding Oracle
An attacker can bypass access restrictions to data via 0-byte Record Padding Oracle of OpenSSL 1.0.2, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 902 903 904 905 906 907 908 909 911 913 914 915 916 917 918 919 920 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1132