The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Squid: out-of-bounds memory reading via cachemgr.cgi
An attacker can force a read at an invalid address via cachemgr.cgi of Squid, in order to trigger a denial of service, or to obtain sensitive information...
snapd: information disclosure via snap-confine Symlink
An attacker can bypass access restrictions to data via snap-confine Symlink of snapd, in order to obtain sensitive information...
MiniMagick: code execution via Image.open
An attacker can use a vulnerability via Image.open of MiniMagick, in order to run code...
WordPress FV Flowplayer Video Player: SQL injection
An attacker can use a SQL injection of WordPress FV Flowplayer Video Player, in order to read or alter data...
Linux kernel: use after free via smp_task_timedout
An attacker can force the usage of a freed memory area via smp_task_timedout() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Squid: information disclosure via Basic Authentication uudecode
An attacker can bypass access restrictions to data via Basic Authentication uudecode of Squid, in order to obtain sensitive information...
Squid: buffer overflow via Basic Authentication HttpHeader-getAuth
An attacker can trigger a buffer overflow via Basic Authentication HttpHeader::getAuth of Squid, in order to trigger a denial of service, and possibly to run code...
Squid: integer overflow via Digest Authentication Single Quote
An attacker can trigger an integer overflow via Digest Authentication Single Quote of Squid, in order to trigger a denial of service, and possibly to run code...
WordPress Appointment Hour Booking: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Appointment Hour Booking, in order to run JavaScript code in the context of the web site...
OTRS Help Desk: privilege escalation via Session ID Link Sharing
An attacker can bypass restrictions via Session ID Link Sharing of OTRS Help Desk, in order to escalate his privileges...
OTRS Help Desk: information disclosure via Search Results Company Tickets
An attacker can bypass access restrictions to data via Search Results Company Tickets of OTRS Help Desk, in order to obtain sensitive information...
OTRS Help Desk: information disclosure via Template Tags Password Hashs
An attacker can bypass access restrictions to data via Template Tags Password Hashs of OTRS Help Desk, in order to obtain sensitive information...
Redis: buffer overflow via Hyperloglog 12 Bytes
An attacker can trigger a buffer overflow via Hyperloglog 12 Bytes of Redis, in order to trigger a denial of service, and possibly to run code...
Asterisk: denial of service via chan_sip
An attacker can trigger a fatal error via chan_sip of Asterisk, in order to trigger a denial of service...
Asterisk: denial of service via MESSAGE
An attacker can trigger a fatal error via MESSAGE of Asterisk, in order to trigger a denial of service...
Castle Rock SNMPc: buffer overflow via Map Objects
An attacker can trigger a buffer overflow via Map Objects of Castle Rock SNMPc, in order to trigger a denial of service, and possibly to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Kaspersky Anti-Virus: information disclosure via Unique Product ID
An attacker can bypass access restrictions to data via Unique Product ID of Kaspersky Anti-Virus, in order to obtain sensitive information...
Apache Kafka: privilege escalation via Produce Request
An attacker can bypass restrictions via Produce Request of Apache Kafka, in order to escalate his privileges...
libpng: buffer overflow via Chunks Length
An attacker can trigger a buffer overflow via Chunks Length of libpng, in order to trigger a denial of service, and possibly to run code...
Embedthis GoAhead/Appweb: NULL pointer dereference via Host Header
An attacker can force a NULL pointer to be dereferenced via Host Header of Embedthis GoAhead/Appweb, in order to trigger a denial of service...
Embedthis GoAhead/Appweb: NULL pointer dereference via HTTP Request
An attacker can force a NULL pointer to be dereferenced via HTTP Request of Embedthis GoAhead/Appweb, in order to trigger a denial of service...
FreeBSD: buffer overflow via Telnet Client Environment Variables
An attacker can trigger a buffer overflow via Telnet Client Environment Variables of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Junos OS SRX: denial of service via Fragmented HTTP Packet
An attacker can trigger a fatal error via Fragmented HTTP Packet of Junos OS SRX, in order to trigger a denial of service...
Junos OS: denial of service via BGP Peer Restarts
An attacker can trigger a fatal error via BGP Peer Restarts of Junos OS, in order to trigger a denial of service...
Junos OS: privilege escalation via EX4300 Firewall Filter
An attacker can bypass restrictions via EX4300 Firewall Filter of Junos OS, in order to escalate his privileges...
Junos OS: denial of service via EX4300 Management Interface
An attacker can trigger a fatal error via EX4300 Management Interface of Junos OS, in order to trigger a denial of service...
Drupal Custom Permissions: privilege escalation via Administration UI
An attacker can bypass restrictions via Administration UI of Drupal Custom Permissions, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 939 940 941 942 943 944 945 946 947 949 951 952 953 954 955 956 957 958 959 961 981 1001 1020