The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SUSE wicked: use after free via DHCP6 Client Options
An attacker can force the usage of a freed memory area via DHCP6 Client Options of SUSE wicked, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via opj_t1_clbl_decode_processor
An attacker can trigger a buffer overflow via opj_t1_clbl_decode_processor() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
libsolv: denial of service via repodata_schema2id
An attacker can send malicious repodata_schema2id() packets to libsolv, in order to trigger a denial of service...
Apache XML-RPC: code execution via org.apache.xmlrpc.parser XmlRpcResponseParser-addResult
An attacker can use a vulnerability via org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult of Apache XML-RPC, in order to run code...
Suricata: privilege escalation via TCP FIN Overlapping Signature Bypass
An attacker can bypass restrictions via TCP FIN Overlapping Signature Bypass of Suricata, in order to escalate his privileges...
Suricata: privilege escalation via TCP Timestamp Signature Bypass
An attacker can bypass restrictions via TCP Timestamp Signature Bypass of Suricata, in order to escalate his privileges...
OSSEC HIDS: multiple vulnerabilities
An attacker can use several vulnerabilities of OSSEC HIDS...
Jenkins Plugins: three vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Jenkins Core: seven vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core...
WebKitGTK: three vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
hiredis: NULL pointer dereference via async.c / dict.c
An attacker can force a NULL pointer to be dereferenced via async.c / dict.c of hiredis, in order to trigger a denial of service...
apt-cacher-ng: information disclosure via TCP Port 3142
An attacker can bypass access restrictions to data via TCP Port 3142 of apt-cacher-ng, in order to obtain sensitive information...
openSUSE Leap: privilege escalation via apt-cacher-ng
An attacker can bypass restrictions via apt-cacher-ng of openSUSE Leap, in order to escalate his privileges...
Joomla Core: three vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Python: executing DLL code via Windows 7 api-ms-win-core-path-l1-1-0.dll
An attacker can create a malicious Windows 7 api-ms-win-core-path-l1-1-0.dll DLL, and then put it in the current directory of Python, in order to execute code...
Linux kernel: use after free via open may_create_in_sticky
An attacker can force the usage of a freed memory area via open may_create_in_sticky() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
OpenSMTPD: denial of service via Opportunistic TLS Downgrade
An attacker can trigger a fatal error via Opportunistic TLS Downgrade of OpenSMTPD, in order to trigger a denial of service...
OpenSMTPD: code execution via mbox/lmtp Delivery
An attacker can use a vulnerability via mbox/lmtp Delivery of OpenSMTPD, in order to run code...
FreeBSD: information disclosure via Core Dump Thrmisc Data Structure
A local attacker can read a memory fragment via Core Dump Thrmisc Data Structure of FreeBSD, in order to obtain sensitive information...
FreeBSD: privilege escalation via IPsec Replay Window Packet Injection
An attacker can bypass restrictions via IPsec Replay Window Packet Injection of FreeBSD, in order to escalate his privileges...
FreeBSD: buffer overflow via libfetch
An attacker can trigger a buffer overflow via libfetch of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
AWS CLI: privilege escalation via AMI Loading
An attacker can bypass restrictions via AMI Loading of AWS CLI, in order to escalate his privileges...
storeBackup: file corruption via /tmp/storeBackup.lock
A local attacker can create a symbolic link named /tmp/storeBackup.lock, in order to alter the pointed file, with privileges of storeBackup...
Magento: six vulnerabilities
An attacker can use several vulnerabilities of Magento...
OpenJPEG: buffer overflow via opj_t1_clbl_decode_processor
An attacker can trigger a buffer overflow via opj_t1_clbl_decode_processor() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
GNU LibreDWG: seven vulnerabilities
An attacker can use several vulnerabilities of GNU LibreDWG...
Squid Analysis Report Generator: file corruption via /tmp/sarg/denied.int_unsory
A local attacker can create a symbolic link named /tmp/sarg/denied.int_unsory, in order to alter the pointed file, with privileges of Squid Analysis Report Generator...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996 997 998 999 1000 1001 1002 1003 1004 1006 1008 1009 1010 1011