The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Ruby: information disclosure via WEBrick HTTP Response Splitting
An attacker can bypass access restrictions to data via WEBrick HTTP Response Splitting of Ruby, in order to obtain sensitive information...
Ruby: denial of service via WEBrick Service Regular Expression
An attacker can trigger a fatal error via WEBrick Service Regular Expression of Ruby, in order to trigger a denial of service...
Ruby: information disclosure via File.fnmatch NUL Character Injection
An attacker can bypass access restrictions to data via File.fnmatch NUL Character Injection of Ruby, in order to obtain sensitive information...
HAProxy: denial of service via HTTP/2 HEADER Frames IDLE Stream
An attacker can trigger a fatal error via HTTP/2 HEADER Frames IDLE Stream of HAProxy, in order to trigger a denial of service...
Kaspersky Anti-Virus: multiple vulnerabilities
An attacker can use several vulnerabilities of Kaspersky Anti-Virus...
HAProxy: information disclosure via HTTP/2 Header Control Characters
An attacker can bypass access restrictions to data via HTTP/2 Header Control Characters of HAProxy, in order to obtain sensitive information...
FortiGate: Cross Site Scripting via DHCP Monitor Page
An attacker can trigger a Cross Site Scripting via DHCP Monitor Page of FortiGate, in order to run JavaScript code in the context of the web site...
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
Ansible Tower: information disclosure via /api/v2/config
An attacker can bypass access restrictions to data via /api/v2/config of Ansible Tower, in order to obtain sensitive information...
libvpx: information disclosure
An attacker can bypass access restrictions to data of libvpx, in order to obtain sensitive information...
libvpx: denial of service
An attacker can trigger a fatal error of libvpx, in order to trigger a denial of service...
libvpx: out-of-bounds memory reading
An attacker can force a read at an invalid address of libvpx, in order to trigger a denial of service, or to obtain sensitive information...
libvpx: out-of-bounds memory reading
An attacker can force a read at an invalid address of libvpx, in order to trigger a denial of service, or to obtain sensitive information...
Unbound: code execution via IPSEC Module
An attacker can use a vulnerability via IPSEC Module of Unbound, in order to run code...
Pivotal RabbitMQ: Cross Site Scripting via Federation/Shovel Endpoints
An attacker can trigger a Cross Site Scripting via Federation/Shovel Endpoints of Pivotal RabbitMQ, in order to run JavaScript code in the context of the web site...
Pivotal RabbitMQ: denial of service via X-Reason HTTP Header
An attacker can trigger a fatal error via X-Reason HTTP Header of Pivotal RabbitMQ, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via unregister_snap_client
An attacker can force a NULL pointer to be dereferenced via unregister_snap_client of the Linux kernel, in order to trigger a denial of service...
Outlook for Android: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Outlook for Android, in order to run JavaScript code in the context of the web site...
IBM Spectrum Protect: read-write access via CIT Files Permissions
An attacker can bypass access restrictions via CIT Files Permissions of IBM Spectrum Protect, in order to read or alter data...
LibOFX: NULL pointer dereference via OFXApplication-startElement
An attacker can force a NULL pointer to be dereferenced via OFXApplication::startElement() of LibOFX, in order to trigger a denial of service...
Linux kernel: buffer overflow via mmwifiex_process_tdls_action_frame
An attacker can trigger a buffer overflow via mmwifiex_process_tdls_action_frame() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
phpMyAdmin: SQL injection via Designer Database Name
An attacker can use a SQL injection via Designer Database Name of phpMyAdmin, in order to read or alter data...
Linux kernel: buffer overflow via libertas lbs_ibss_join_existing
An attacker can trigger a buffer overflow via libertas lbs_ibss_join_existing() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via libertas add_ie_rates
An attacker can trigger a buffer overflow via libertas add_ie_rates() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via mwifiex_process_country_ie
An attacker can trigger a buffer overflow via mwifiex_process_country_ie() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Vtiger CRM: privilege escalation via Profile Edition Role ID
An attacker can bypass restrictions via Profile Edition Role ID of Vtiger CRM, in order to escalate his privileges...
Shibboleth Service Provider: privilege escalation via Specfile Commands
An attacker can bypass restrictions via Specfile Commands of Shibboleth Service Provider, in order to escalate his privileges...
Centreon Web: two vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
OpenBSD: information disclosure via Mesa Drivers
A local attacker can read a memory fragment via Mesa Drivers of OpenBSD, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 979 980 981 982 983 984 985 986 987 989 991 992 993 994 995 996 997 998 999 1001 1021 1041 1061 1080