The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
NASM: denial of service via expr5
An attacker can trigger a fatal error via expr5() of NASM, in order to trigger a denial of service...
NASM: memory corruption via assemble_file
An attacker can trigger a memory corruption via assemble_file() of NASM, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via cmm_timeout_handler
An attacker can bypass access restrictions to data via cmm_timeout_handler() of the Linux kernel, in order to obtain sensitive information...
GST: information disclosure via Internet Connection
An attacker can bypass access restrictions to data via Internet Connection of GST, in order to obtain sensitive information...
Joomla JS Jobs: SQL injection
An attacker can use a SQL injection of Joomla JS Jobs, in order to read or alter data...
Python: executing DLL code via python3.dll
An attacker can create a malicious python3.dll DLL, and then put it in the current directory of Python, in order to execute code...
Chocolate Doom: buffer overflow via num_players
An attacker can trigger a buffer overflow via num_players of Chocolate Doom, in order to trigger a denial of service, and possibly to run code...
MediaWiki: information disclosure via Cache-Control Vary headers
An attacker can bypass access restrictions to data via Cache-Control Vary headers of MediaWiki, in order to obtain sensitive information...
Pillow: out-of-bounds memory reading via libImaging/PcxDecode.c
An attacker can force a read at an invalid address via libImaging/PcxDecode.c of Pillow, in order to trigger a denial of service, or to obtain sensitive information...
Pillow: out-of-bounds memory reading via libImaging/SgiRleDecode.c
An attacker can force a read at an invalid address via libImaging/SgiRleDecode.c of Pillow, in order to trigger a denial of service, or to obtain sensitive information...
Pillow: buffer overflow via libImaging/TiffDecode.c
An attacker can trigger a buffer overflow via libImaging/TiffDecode.c of Pillow, in order to trigger a denial of service, and possibly to run code...
Pillow: out-of-bounds memory reading via libImaging/Jpeg2KDecode.c
An attacker can force a read at an invalid address via libImaging/Jpeg2KDecode.c of Pillow, in order to trigger a denial of service, or to obtain sensitive information...
Pillow: out-of-bounds memory reading via libImaging/FliDecode.c
An attacker can force a read at an invalid address via libImaging/FliDecode.c of Pillow, in order to trigger a denial of service, or to obtain sensitive information...
libfilezilla: vulnerability
A vulnerability of libfilezilla was announced...
Check Point ZoneAlarm Extreme Security: privilege escalation via Service Symbolic Link
An attacker can bypass restrictions via Service Symbolic Link of Check Point ZoneAlarm Extreme Security, in order to escalate his privileges...
UPnP: information disclosure via SUBSCRIBE Delivery URL
An attacker can bypass access restrictions to data via SUBSCRIBE Delivery URL of UPnP, in order to obtain sensitive information...
Linux kernel: buffer overflow via __btrfs_map_block
An attacker can trigger a buffer overflow via __btrfs_map_block() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via btrfs_insert_delayed_items
An attacker can force the usage of a freed memory area via btrfs_insert_delayed_items() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Ubuntu net-snmp: use after free via usm_free_usmStateReference
An attacker can force the usage of a freed memory area via usm_free_usmStateReference() of Ubuntu net-snmp, in order to trigger a denial of service, and possibly to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
LibVNCServer: buffer overflow via websockets.c
An attacker can trigger a buffer overflow via websockets.c of LibVNCServer, in order to trigger a denial of service, and possibly to run code...
Samba: four vulnerabilities
An attacker can use several vulnerabilities of Samba...
Wireshark 3.2: overload via GVCP
An attacker can trigger an overload via GVCP of Wireshark 3.2, in order to trigger a denial of service...
Drupal Renderkit: information disclosure via Ignored Access Property
An attacker can bypass access restrictions to data via Ignored Access Property of Drupal Renderkit, in order to obtain sensitive information...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco AnyConnect Secure Mobility Client for Mac OS: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Cisco AnyConnect Secure Mobility Client for Mac OS...
QEMU: NULL pointer dereference via MMIO R/W Operations
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via MMIO R/W Operations of QEMU, in order to trigger a denial of service on the host system...
FasterXML jackson-databind: code execution via org.jsecurity
An attacker can use a vulnerability via org.jsecurity of FasterXML jackson-databind, in order to run code...
FasterXML jackson-databind: code execution via xalan2
An attacker can use a vulnerability via xalan2 of FasterXML jackson-databind, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1038 1039 1040 1041 1042 1043 1044 1045 1046 1048 1050 1051 1052 1053 1054 1055 1056 1057 1058 1060