The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM DB2: multiple vulnerabilities in libraries
An attacker can use several vulnerabilities in libraries used by IBM DB2...
CUPS: buffer overflow via ppdFindOption
An attacker can trigger a buffer overflow via ppdFindOption() of CUPS, in order to trigger a denial of service, and possibly to run code...
Squid cache: integer overflow via the HTTP Digest authentication
An attacker can trigger an integer overflow via the HTTP Digest authentication in Squid cache, in order to trigger a denial of service, and possibly to run code...
Squid cache: buffer overflow via ESI
An attacker can trigger a buffer overflow via ESI of Squid cache, in order to trigger a denial of service, and possibly to run code...
WordPress data-tables-generator-by-supsystic: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress data-tables-generator-by-supsystic...
WordPress Responsive Ready Sites Importer: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Responsive Ready Sites Importer...
Ceph: denial of service via ill formed XML
An attacker can trigger a fatal error via XML of Ceph, in order to trigger a denial of service...
re2c: memory corruption
An attacker can trigger a memory corruption of re2c, in order to trigger a denial of service, and possibly to run code...
GNU binutils: multiple vulnerabilities
An attacker can use several vulnerabilities of GNU binutils...
Autodesk FBX: six vulnerabilities
An attacker can use several vulnerabilities of Autodesk FBX...
Google Chrome: four vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Joomla Core: three vulnerabilities
An attacker can use several vulnerabilities of Joomla...
IBM Spectrum Protect: buffer overflow
An attacker can trigger a buffer overflow of IBM Spectrum Protect, in order to trigger a denial of service, and possibly to run code...
FreeBSD: use after free via ipfw
An attacker can force the usage of a freed memory area via ipfw of FreeBSD, in order to trigger a denial of service, and possibly to run code...
OpenSSL: NULL pointer dereference via SSL_check_chain
An attacker can force a NULL pointer to be dereferenced via SSL_check_chain() of OpenSSL, in order to trigger a denial of service...
Linux kernel: use after free via cdev_put
An attacker can force the usage of a freed memory area via cdev_put() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Git: information disclosure
An attacker can bypass access restrictions to data of Git, in order to obtain sensitive information...
Sophos Anti-Virus, Endpoint Protection: privilege escalation
An attacker can bypass restrictions of Sophos Anti-Virus, Endpoint Protection, in order to escalate his privileges...
Juniper EX-Series: privilege escalation via NG-RE
An attacker can bypass restrictions via NG-RE of Juniper EX-Series, in order to escalate his privileges...
Squid: two vulnerabilities via Cache Manager
An attacker can use several vulnerabilities via Cache Manager of Squid...
OpenBSD: privilege escalation via DRM Linux
An attacker can bypass restrictions via DRM Linux of OpenBSD, in order to escalate his privileges...
Apache Shiro: privilege escalation via Spring Dynamic Controllers
An attacker can bypass restrictions via Spring Dynamic Controllers of Apache Shiro, in order to escalate his privileges...
GNOME File-roller: directory traversal via Directory Symlink
An attacker can traverse directories via Directory Symlink of GNOME File-roller, in order to create a file outside the service root path...
FasterXML jackson-databind: denial of service via Commons-jelly Embedded Serialization Gadgets Typing
An attacker can trigger a fatal error via Commons-jelly Embedded Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...
FasterXML jackson-databind: denial of service via Spring-aop MethodLocatingFactoryBean Serialization Gadgets Typing
An attacker can trigger a fatal error via Spring-aop MethodLocatingFactoryBean Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...
FasterXML jackson-databind: denial of service via Openjpa WASRegistryManagedRuntime Serialization Gadgets Typing
An attacker can trigger a fatal error via Openjpa WASRegistryManagedRuntime Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...
FasterXML jackson-databind: denial of service via Apache/commons-proxy RmiProvider Serialization Gadgets Typing
An attacker can trigger a fatal error via Apache/commons-proxy RmiProvider Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...
FasterXML jackson-databind: denial of service via Activemq Serialization Gadgets Typing
An attacker can trigger a fatal error via Activemq Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...
FasterXML jackson-databind: denial of service via JEditorPane Serialization Gadgets Typing
An attacker can trigger a fatal error via JEditorPane Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...
FasterXML jackson-databind: denial of service via Bus-proxy RmiProvider Serialization Gadgets Typing
An attacker can trigger a fatal error via Bus-proxy RmiProvider Serialization Gadgets Typing of FasterXML jackson-databind, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1017 1018 1019 1020 1021 1022 1023 1024 1025 1027 1029 1030 1031 1032 1033 1034 1035 1036