The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla XCloner: file reading
A local attacker can read a file of Joomla XCloner, in order to obtain sensitive information...
Node.js apollo: information disclosure
An attacker can bypass access restrictions to data of Node.js apollo, in order to obtain sensitive information...
OTRS Help Desk: information disclosure via BCC Recipients List
An attacker can bypass access restrictions to data via BCC Recipients List of OTRS Help Desk, in order to obtain sensitive information...
Portable UPnP SDK: NULL pointer dereference via FindServiceControlURLPath
An attacker can force a NULL pointer to be dereferenced via FindServiceControlURLPath() of Portable UPnP SDK, in order to trigger a denial of service...
SQLite: use after free via resetAccumulator
An attacker can force the usage of a freed memory area via resetAccumulator() of SQLite, in order to trigger a denial of service, and possibly to run code...
xawtv: read-write access
An attacker can bypass access restrictions of xawtv, in order to read or alter data...
Axel: Man-in-the-Middle via Hostname Not Verified
An attacker can act as a Man-in-the-Middle via Hostname Not Verified on Axel, in order to read or write data in the session...
OpenBSD: memory corruption via asr
An attacker can trigger a memory corruption via asr of OpenBSD, in order to trigger a denial of service, and possibly to run code...
PHPMailer: Cross Site Scripting via File Attachment Names
An attacker can trigger a Cross Site Scripting via File Attachment Names of PHPMailer, in order to run JavaScript code in the context of the web site...
GnuTLS: information disclosure via Session Ticket Incorrect Cryptography
An attacker can bypass access restrictions to data via Session Ticket Incorrect Cryptography of GnuTLS, in order to obtain sensitive information...
GraphicsMagick: buffer overflow via ReadMNGImage
An attacker can trigger a buffer overflow via ReadMNGImage() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
OpenBSD: denial of service via HID Descriptors Parsing
An attacker can trigger a fatal error via HID Descriptors Parsing of OpenBSD, in order to trigger a denial of service...
WebSphere AS Network Deployment: code execution via Serialized Objects
An attacker can use a vulnerability via Serialized Objects of WebSphere AS Network Deployment, in order to run code...
WebSphere AS: information disclosure via Serialized Objects
An attacker can bypass access restrictions to data via Serialized Objects of WebSphere AS, in order to obtain sensitive information...
WebSphere AS: code execution via Serialized Objects
An attacker can use a vulnerability via Serialized Objects of WebSphere AS, in order to run code...
D-Bus: denial of service via File Descriptor Leak
An attacker can trigger a fatal error via File Descriptor Leak of D-Bus, in order to trigger a denial of service...
Arm Mbed TLS: information disclosure via ECDSA Side Channel Attack
An attacker can bypass access restrictions to data via ECDSA Side Channel Attack of Arm Mbed TLS, in order to obtain sensitive information...
Thunderbird: information disclosure via STARTTLS IMAP PREAUTH unencrypted
An attacker can bypass access restrictions to data via STARTTLS IMAP PREAUTH unencrypted of Thunderbird, in order to obtain sensitive information...
Linux kernel: overload via prb_calc_retire_blk_tmo
An attacker can trigger an overload via prb_calc_retire_blk_tmo() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory corruption via rx_queue_add_kobject
An attacker can trigger a memory corruption via rx_queue_add_kobject() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
FortiAnalyzer: Cross Site Scripting via Admin Profile Description Area
An attacker can trigger a Cross Site Scripting via Admin Profile Description Area of FortiAnalyzer, in order to run JavaScript code in the context of the web site...
Linux kernel: memory corruption via DAX Mapped Nvdimm
An attacker can trigger a memory corruption via DAX Mapped Nvdimm of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
QEMU: overload via ati_mm_read/write
An attacker, inside a guest system, can trigger an overload via ati_mm_read/write of QEMU, in order to trigger a denial of service on the host system...
QEMU: denial of service via ati-vga Emulator
An attacker, inside a guest system, can trigger a fatal error via ati-vga Emulator of QEMU, in order to trigger a denial of service on the host system...
e6y prboom-plus: buffer overflow via UDP Packets
An attacker can trigger a buffer overflow via UDP Packets of e6y prboom-plus, in order to trigger a denial of service, and possibly to run code...
Chrome: four vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Elasticsearch: privilege escalation via API Key Privilege
An attacker can bypass restrictions via API Key Privilege of Elasticsearch, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1029 1030 1031 1032 1033 1034 1035 1036 1037 1039 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050