The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
c-ares: use after free via ares_destroy
An attacker can force the usage of a freed memory area via ares_destroy() of c-ares, in order to trigger a denial of service, and possibly to run code...
OpenSC: buffer overflow via tcos_decipher
An attacker can trigger a buffer overflow via tcos_decipher() of OpenSC, in order to trigger a denial of service, and possibly to run code...
OpenSC: buffer overflow via sc_pkcs15emu_gemsafeGPK_init
An attacker can trigger a buffer overflow via sc_pkcs15emu_gemsafeGPK_init() of OpenSC, in order to trigger a denial of service, and possibly to run code...
OpenSC: buffer overflow via sc_oberthur_read_file
An attacker can trigger a buffer overflow via sc_oberthur_read_file() of OpenSC, in order to trigger a denial of service, and possibly to run code...
Squeezelite: vulnerability
A vulnerability of Squeezelite was announced...
libxls: NULL pointer dereference via xls2csv.c
An attacker can force a NULL pointer to be dereferenced via xls2csv.c of libxls, in order to trigger a denial of service...
Fedora libpri: security improvement via Hardening Flags Build
The security of libpri was improved via Hardening Flags Build...
OpenEXR: buffer overflow via writeTileData
An attacker can trigger a buffer overflow via writeTileData() of OpenEXR, in order to trigger a denial of service, and possibly to run code...
OpenEXR: NULL pointer dereference via generatePreview
An attacker can force a NULL pointer to be dereferenced via generatePreview() of OpenEXR, in order to trigger a denial of service...
etcd: six vulnerabilities
An attacker can use several vulnerabilities of etcd...
Node.js ini: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js ini, in order to escalate his privileges...
Linux kernel: information disclosure via collect_syscall
A local attacker can read a memory fragment via collect_syscall() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: use after free via trace_open
An attacker can force the usage of a freed memory area via trace_open() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP AFM: memory leak via HTTP Security Profile
An attacker can create a memory leak via HTTP Security Profile of F5 BIG-IP AFM, in order to trigger a denial of service...
F5 BIG-IP AFM: information disclosure via Syncookie Leaks
An attacker can bypass access restrictions to data via Syncookie Leaks of F5 BIG-IP AFM, in order to obtain sensitive information...
F5 BIG-IP: denial of service via FTP Profile
An attacker can trigger a fatal error via FTP Profile of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: Cross Site Scripting via iControl REST
An attacker can trigger a Cross Site Scripting via iControl REST of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
Wireshark: four vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Linux kernel: use after free via TIOCSPGRP
An attacker can force the usage of a freed memory area via TIOCSPGRP of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via TIOCGSID
An attacker can force the usage of a freed memory area via TIOCGSID of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via lib/openjp2/mqc.c
An attacker can trigger a buffer overflow via lib/openjp2/mqc.c of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
spice-gtk: vulnerability
A vulnerability of spice-gtk was announced...
Matrix Synapse: overload via JSON Infinity Values
An attacker can trigger an overload via JSON Infinity Values of Matrix Synapse, in order to trigger a denial of service...
Adobe Acrobat/Reader: information disclosure
An attacker can bypass access restrictions to data of Adobe Acrobat/Reader, in order to obtain sensitive information...
AIX: privilege escalation via ksu
An attacker can bypass restrictions via ksu of AIX, in order to escalate his privileges...
Python APT: memory leak
An attacker can create a memory leak of Python APT, in order to trigger a denial of service...
APT: integer overflow via Deb Packages Parsing
An attacker can trigger an integer overflow via Deb Packages Parsing of APT, in order to trigger a denial of service, and possibly to run code...
Node.js fast-csv: overload via IgnoreEmpty Regular Expression
An attacker can trigger an overload via IgnoreEmpty Regular Expression of Node.js fast-csv, in order to trigger a denial of service...
ArubaOS: three vulnerabilities
An attacker can use several vulnerabilities of ArubaOS...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1084 1085 1086 1087 1088 1089 1090 1091 1092 1094 1096 1097 1098 1099 1100 1101 1102 1103 1104