The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ProFTPD: privilege escalation via CRL Entry Revoked Certificates tls_verify_crl
An attacker can bypass restrictions via CRL Entry Revoked Certificates tls_verify_crl() of ProFTPD, in order to escalate his privileges...
ProFTPD: NULL pointer dereference via Client Certificate tls_verify_crl
An attacker can force a NULL pointer to be dereferenced via Client Certificate tls_verify_crl() of ProFTPD, in order to trigger a denial of service...
Centreon: Cross Site Scripting via My Account
An attacker can trigger a Cross Site Scripting via My Account of Centreon, in order to run JavaScript code in the context of the web site...
NetBSD: information disclosure via Kern.arandom Sysctl Forward Secrecy
An attacker can bypass access restrictions to data via Kern.arandom Sysctl Forward Secrecy of NetBSD, in order to obtain sensitive information...
FreeImage: denial of service via TIFFReadDirectory
An attacker can trigger a fatal error via TIFFReadDirectory() of FreeImage, in order to trigger a denial of service...
FreeImage: buffer overflow via PluginTIFF.cpp
An attacker can trigger a buffer overflow via PluginTIFF.cpp of FreeImage, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: denial of service via Age Header Value
An attacker can trigger a fatal error via Age Header Value of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: infinite loop via TMM FIX Profile
An attacker can trigger an infinite loop via TMM FIX Profile of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via HTTP/2 Full Proxy Mode
An attacker can trigger a fatal error via HTTP/2 Full Proxy Mode of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP ASM: denial of service via Bot Detection DNS Cache
An attacker can trigger a fatal error via Bot Detection DNS Cache of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP APM: privilege escalation via Edge Client for macOS
An attacker can bypass restrictions via Edge Client for macOS of F5 BIG-IP APM, in order to escalate his privileges...
F5 BIG-IP: information disclosure via HTTP Headers Prepended Whitespace
An attacker can bypass access restrictions to data via HTTP Headers Prepended Whitespace of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: memory leak via TMM Packet Fragments
An attacker can create a memory leak via TMM Packet Fragments of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP ASM: Man-in-the-Middle via Central Policy Builder / BIG-IQ
An attacker can act as a Man-in-the-Middle via Central Policy Builder / BIG-IQ on F5 BIG-IP ASM, in order to read or write data in the session...
F5 BIG-IP APM: privilege escalation via RDP Restrict to Single Client IP
An attacker can bypass restrictions via RDP Restrict to Single Client IP of F5 BIG-IP APM, in order to escalate his privileges...
F5 BIG-IP AFM: infinite loop via Bad-Actor Detection
An attacker can trigger an infinite loop via Bad-Actor Detection of F5 BIG-IP AFM, in order to trigger a denial of service...
F5 BIG-IP: denial of service via TMM Traffic Flow
An attacker can trigger a fatal error via TMM Traffic Flow of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: information disclosure via vCMP Plaintext Unit Key
An attacker can bypass access restrictions to data via vCMP Plaintext Unit Key of F5 BIG-IP, in order to obtain sensitive information...
FreeRDP: memory leak via HuffmanTree_makeFromFrequencies
An attacker can create a memory leak via HuffmanTree_makeFromFrequencies() of FreeRDP, in order to trigger a denial of service...
FreeRDP: memory leak via libfreerdp/codec/region.c
An attacker can create a memory leak via libfreerdp/codec/region.c of FreeRDP, in order to trigger a denial of service...
389 Directory Server: information disclosure via Deref Plugin
An attacker can bypass access restrictions to data via Deref Plugin of 389 Directory Server, in order to obtain sensitive information...
FreeIPA: buffer overflow via ber_scanf
An attacker can trigger a buffer overflow via ber_scanf() of FreeIPA, in order to trigger a denial of service, and possibly to run code...
FreeIPA: information disclosure via Command Logged Passwords
An attacker can bypass access restrictions to data via Command Logged Passwords of FreeIPA, in order to obtain sensitive information...
IBM Spectrum Protect Backup-Archive Client: denial of service via Client/Server Timing
An attacker can trigger a fatal error via Client/Server Timing of IBM Spectrum Protect Backup-Archive Client, in order to trigger a denial of service...
Linux kernel: memory corruption via vcs_write
An attacker can trigger a memory corruption via vcs_write() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: integer overflow via cpia2_remap_buffer
An attacker can trigger an integer overflow via cpia2_remap_buffer() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
SQLite: denial of service via TK_COLUMN sqlite3ExprCodeTarget
An attacker can trigger a fatal error via TK_COLUMN sqlite3ExprCodeTarget of SQLite, in order to trigger a denial of service...
SQLite: denial of service via Sub-Select DISTINCT Window
An attacker can trigger a fatal error via Sub-Select DISTINCT Window of SQLite, in order to trigger a denial of service...
Eclipse Jetty: Cross Site Scripting via Generic ErrorHandler
An attacker can trigger a Cross Site Scripting via Generic ErrorHandler of Eclipse Jetty, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 982 983 984 985 986 987 988 989 991 993 994 995 996 997 998 999 1000 1001 1005