The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Firefox/Thunderbird: memory corruption via IonMonkey JIT Compiler
An attacker can trigger a memory corruption via IonMonkey JIT Compiler of Mozilla Firefox, in order to trigger a denial of service, and possibly to run code...
Chrome: use after free via Audio
An attacker can force the usage of a freed memory area via Audio of Chrome, in order to trigger a denial of service, and possibly to run code...
Dovecot: NULL pointer dereference via Push Notification
An attacker can force a NULL pointer to be dereferenced via Push Notification of Dovecot, in order to trigger a denial of service...
phpMyAdmin: SQL injection via User Accounts Page
An attacker can use a SQL injection via User Accounts Page of phpMyAdmin, in order to read or alter data...
curl: information disclosure via Windows SMB Access Smuggling
An attacker can bypass access restrictions to data via Windows SMB Access Smuggling of curl, in order to obtain sensitive information...
sysstat: use after free via check_file_actlst
An attacker can force the usage of a freed memory area via check_file_actlst() of sysstat, in order to trigger a denial of service, and possibly to run code...
Google Android/Pixel: multiple vulnerabilities of January 2020
An attacker can use several vulnerabilities of Google Android/Pixel...
virglrenderer: four vulnerabilities
An attacker can use several vulnerabilities of virglrenderer...
RSA Authentication Manager: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of RSA Authentication Manager, in order to force the victim to perform operations...
Linux kernel: buffer overflow via binder_transaction
An attacker can trigger a buffer overflow via binder_transaction() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
Pillow: buffer overflow via FLI
An attacker can trigger a buffer overflow via FLI of Pillow, in order to trigger a denial of service, and possibly to run code...
Pillow: buffer overflow via PCX P Mode
An attacker can trigger a buffer overflow via PCX P Mode of Pillow, in order to trigger a denial of service, and possibly to run code...
Pillow: denial of service via FpxImagePlugin.py
An attacker can trigger a fatal error via FpxImagePlugin.py of Pillow, in order to trigger a denial of service...
Singularity: privilege escalation via Incorrect File Permissions
An attacker can bypass restrictions via Incorrect File Permissions of Singularity, in order to escalate his privileges...
NetHack: buffer overflow via Configuration File
An attacker can trigger a buffer overflow via Configuration File of NetHack, in order to trigger a denial of service, and possibly to run code...
Cisco Data Center Network Manager: external XML entity injection via SOAP API
An attacker can transmit malicious XML data via SOAP API to Cisco Data Center Network Manager, in order to read a file, scan sites, or trigger a denial of service...
Cisco Data Center Network Manager: privilege escalation via JBoss EAP
An attacker can bypass restrictions via JBoss EAP of Cisco Data Center Network Manager, in order to escalate his privileges...
Cisco Data Center Network Manager: SQL injection via REST/SOAP
An attacker can use a SQL injection via REST/SOAP of Cisco Data Center Network Manager, in order to read or alter data...
Cisco Data Center Network Manager: directory traversal via REST/SOAP
An attacker can traverse directories via REST/SOAP of Cisco Data Center Network Manager, in order to read/write a file outside the service root path...
Cisco Data Center Network Manager: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Cisco Data Center Network Manager, in order to escalate his privileges...
Cisco Data Center Network Manager: privilege escalation
An attacker can bypass restrictions of Cisco Data Center Network Manager, in order to escalate his privileges...
ESET NOD32 Antivirus: privilege escalation via ZIP Compression Information
An attacker can bypass restrictions via ZIP Compression Information of ESET NOD32 Antivirus, in order to escalate his privileges...
Waitress WSGI Server: read-write access via HTTP Request Smuggling
An attacker can bypass access restrictions via HTTP Request Smuggling of Waitress WSGI Server, in order to read or alter data...
Linux kernel: memory leak via __feat_register_sp
An attacker can create a memory leak via __feat_register_sp() of the Linux kernel, in order to trigger a denial of service...
Mozilla NSS: buffer overflow via Cryptographic Primitives
An attacker can trigger a buffer overflow via Cryptographic Primitives of Mozilla NSS, in order to trigger a denial of service, and possibly to run code...
Mitel SIP-DECT: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Mitel SIP-DECT, in order to read or write data in the session...
Node.js type-graphql: information disclosure via Error Message Resolver Source Code
An attacker can bypass access restrictions to data via Error Message Resolver Source Code of Node.js type-graphql, in order to obtain sensitive information...
Check Point Endpoint Security Client for Windows: denial of service via Non-standard Locations Log Files Storing
An attacker can trigger a fatal error via Non-standard Locations Log Files Storing of Check Point Endpoint Security Client for Windows, in order to trigger a denial of service...
Forcepoint NGFW Security Management Center: privilege escalation via Incorrect IPsec Configuration
An attacker can bypass restrictions via Incorrect IPsec Configuration of Forcepoint NGFW Security Management Center, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 990 991 992 993 994 995 996 997 998 1000 1002 1003