The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FreeRDP: buffer overflow
An attacker can generate a buffer overflow of FreeRDP, in order to trigger a denial of service, and possibly to run code...
freerdp: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of freerdp, in order to trigger a denial of service...
ISC BIND: assertion error via buffer.c
An attacker can force an assertion error via buffer.c of ISC BIND, in order to trigger a denial of service...
WordPress W3 Total Cache: four vulnerabilities
An attacker can use several vulnerabilities of WordPress W3 Total Cache...
Joomla Huge IT Googlemaps: SQL injection
An attacker can use a SQL injection of Joomla Huge IT Googlemaps, in order to read or alter data...
Joomla Event Booking: SQL injection
An attacker can use a SQL injection of Joomla Event Booking, in order to read or alter data...
Django: Cross Site Request Forgery via Google Analytics
An attacker can trigger a Cross Site Request Forgery via Google Analytics of Django, in order to force the victim to perform operations...
Apple iOS 10: easier decryption of backups
An attacker can more easily perform a brute force attack on Apple iOS 10 backups, in order to obtain sensitive data...
OpenSSL 1.0.2i: NULL pointer dereference via CRL
An attacker can force a NULL pointer to be dereferenced via a CRL on an application linked to OpenSSL 1.0.2i, in order to trigger a denial of service...
OpenSSL 1.1.0a: use after free via TLS
An attacker can force the usage of a freed memory area via TLS on an application linked to OpenSSL 1.1.0a, in order to trigger a denial of service, and possibly to run code...
Google Chrome: out-of-bounds memory reading via RenderFrame
An attacker can force a read at an invalid address via RenderFrame of Google Chrome, in order to trigger a denial of service, or to obtain sensitive information...
SPIP: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SPIP, in order to run JavaScript code in the context of the web site...
LibTIFF: multiple vulnerabilities
An attacker can use several vulnerabilities of LibTIFF...
Bash: code execution via HOSTNAME
An attacker can use a vulnerability via HOSTNAME of Bash, in order to run code...
ImageMagick: vulnerability
A vulnerability of ImageMagick was announced...
Node.js: three vulnerabilities
An attacker can use several vulnerabilities of Node.js...
MAC-Telnet: buffer overflow
An attacker can generate a buffer overflow of MAC-Telnet, in order to trigger a denial of service, and possibly to run code...
SELinux: privilege escalation via TIOCSTI
An attacker can bypass restrictions via TIOCSTI of SELinux, in order to escalate his privileges...
dwarfutils: two vulnerabilities
An attacker can use several vulnerabilities of dwarfutils...
QEMU: buffer overflow via xlnx.xps-ethernetlite
An attacker, inside a guest system, can generate a buffer overflow via xlnx.xps-ethernetlite of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
openvas: vulnerability
A vulnerability of openvas was announced...
WordPress Genesis Simple Defaults: file upload via uploadFavicon.php
An attacker can upload a malicious file via "uploadFavicon.php" on WordPress Genesis Simple Defaults, in order for example to upload a Trojan...
Microsoft Windows Journal: buffer overflow via a jtp file
An attacker can generate a buffer overflow via a jtp file in Microsoft Windows Journal, in order to trigger a denial of service, and possibly to run code...
IBM WebSphere Application Server: code execution via serialized objects
An attacker can use a vulnerability via serial of IBM WebSphere Application Server, in order to run code...
MySQL: two vulnerabilities
An attacker can use several vulnerabilities of MySQL...
shiro: privilege escalation
An attacker can bypass access restrictions of shiro, in order to access to unauthorized Web pages...
OpenBSD: blocking weak hash algorithms via SNI
The security of OpenBSD was improved via SNI...
Cisco Email Security Appliance: privilege escalation via a test interface
An attacker can use the test interface of Cisco Email Security Appliance, in order to get full control of the product...
IBM AIX: directory traversal via pConsole Tivoli Lightweight Infrastructure
An attacker can traverse directories via Tivoli Lightweight Infrastructure of IBM AIX, in order to read a file outside the service root path...
RHEL 7: privilege escalation via ACPI_INITRD_TABLE_OVERRIDE
An attacker can bypass restrictions via ACPI_INITRD_TABLE_OVERRIDE on RHEL 7, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 637 638 639 640 641 642 643 644 645 647 649 650 651 652 653 654 655 656 657 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1012