The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Wget: buffer overflow via IRI
An attacker can trigger a buffer overflow of Wget, in order to trigger a denial of service, and possibly to run code...
Python Pallets Project Flask: memory leak via JSON Data
An attacker can create a memory leak via JSON Data of Python Pallets Project Flask, in order to trigger a denial of service...
Tor: memory leak via KIST Cell Scheduler
An attacker can create a memory leak via KIST Cell Scheduler of Tor, in order to trigger a denial of service...
Bluez: out-of-bounds memory reading via packet_hexdump
An attacker can force a read at an invalid address via packet_hexdump() of Bluez, in order to trigger a denial of service, or to obtain sensitive information...
Google Android/Pixel: multiple vulnerabilities of April 2019
An attacker can use several vulnerabilities of Google Android/Pixel...
Node.js tesseract.js: information disclosure
An attacker can bypass access restrictions to data of Node.js tesseract.js, in order to obtain sensitive information...
Cloud Foundry Container Runtime: information disclosure via Container Networking Interface
An attacker can bypass access restrictions to data via Container Networking Interface of Cloud Foundry Container Runtime, in order to obtain sensitive information...
Fortinet FortiClient Mac: denial of service
An attacker can trigger a fatal error of Fortinet FortiClient Mac, in order to trigger a denial of service...
Kubernetes: directory traversal via Kubectl Cp
An attacker can traverse directories via Kubectl Cp of Kubernetes, in order to read a file outside the service root path...
PostgreSQL: code execution via COPY TO/FROM PROGRAM
An attacker can use a vulnerability via COPY TO/FROM PROGRAM of PostgreSQL, in order to run code...
Apache httpd: information disclosure via URL Normalization Consecutive Slashes
An attacker can bypass access restrictions to data via URL Normalization Consecutive Slashes of Apache httpd, in order to obtain sensitive information...
Apache httpd mod_auth_digest: privilege escalation via Race Condition
An attacker can bypass restrictions via Race Condition of Apache httpd mod_auth_digest, in order to escalate his privileges...
Apache httpd mod_ssl: privilege escalation via Per-location Client Certificate
An attacker can bypass restrictions via Per-location Client Certificate of Apache httpd mod_ssl, in order to escalate his privileges...
Apache httpd: privilege escalation via Scoreboard
An attacker can bypass restrictions via Scoreboard of Apache httpd, in order to escalate his privileges...
Apache httpd mod_http2: denial of service via H2Upgrade
An attacker can trigger a fatal error via mod_http2 H2Upgrade of Apache httpd, in order to trigger a denial of service...
Apache httpd mod_http2: denial of service via String Compare
An attacker can trigger a fatal error via mod_http2 String Compare of Apache httpd, in order to trigger a denial of service...
IBM DB2: buffer overflow
An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
IBM DB2: buffer overflow via libdb2e.so.1
An attacker can trigger a buffer overflow via libdb2e.so.1 of IBM DB2, in order to trigger a denial of service, and possibly to run code...
Flatpak: privilege escalation via Seccomp
An attacker can bypass restrictions via Seccomp of Flatpak, in order to escalate his privileges...
Rails: code execution via Development Mode
An attacker can use a vulnerability via Development Mode of Rails, in order to run code...
Notepad++: buffer overflow via Command-extractArgs
An attacker can trigger a buffer overflow via Command::extractArgs of Notepad++, in order to trigger a denial of service, and possibly to run code...
FortiOS: information disclosure via HTTP Headers Parsing
An attacker can bypass access restrictions to data via HTTP Headers Parsing of FortiOS, in order to obtain sensitive information...
Forcepoint Email Security: privilege escalation via Password Reset Link Expiration
An attacker can bypass restrictions via Password Reset Link Expiration of Forcepoint Email Security, in order to escalate his privileges...
GPAC: buffer overflow via MP4Box
An attacker can trigger a buffer overflow via MP4Box of GPAC, in order to trigger a denial of service, and possibly to run code...
sysstat: out-of-bounds memory reading via remap_struct memset
An attacker can force a read at an invalid address via remap_struct() memset() of sysstat, in order to trigger a denial of service, or to obtain sensitive information...
sysstat: out-of-bounds memory reading via remap_struct memmove
An attacker can force a read at an invalid address via remap_struct() memmove() of sysstat, in order to trigger a denial of service, or to obtain sensitive information...
Rails: infinite loop via Action View
An attacker can trigger an infinite loop via Action View of Rails, in order to trigger a denial of service...
Rails: file reading via Action View
A local attacker can read a file via Action View of Rails, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 911 912 913 914 915 916 917 918 919 921 923 924 925 926 927 928 929 930 931 941 961 981 1001 1021 1041 1061 1081 1091