The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: privilege escalation via __get_user_asm_ex
This vulnerability originates from a missing backport of VIGILANCE-VUL-21021 on versions 4.4.22 to 4.4.28...
WebKit: infinite loop via JavaScript Regex
An attacker can generate an infinite loop via JavaScript Regex of WebKit, in order to trigger a denial of service...
ImageMagick: NULL pointer dereference via tiff.c
An attacker can force a NULL pointer to be dereferenced via tiff.c of ImageMagick, in order to trigger a denial of service...
ImageMagick: buffer overflow via IsPixelGray
An attacker can generate a buffer overflow via IsPixelGray of ImageMagick, in order to trigger a denial of service, and possibly to run code...
ICU: integer overflow
An attacker can generate an integer overflow of ICU, in order to trigger a denial of service, and possibly to run code...
ICU: buffer overflow via Font File
An attacker can generate a buffer overflow via Font File of ICU, in order to trigger a denial of service, and possibly to run code...
ICU: buffer overflow
An attacker can generate a buffer overflow of ICU, in order to trigger a denial of service, and possibly to run code...
ImageMagick: use after free via attribute.c
An attacker can force the usage of a freed memory area via attribute.c of ImageMagick, in order to trigger a denial of service, and possibly to run code...
Tornado: privilege escalation via Cookies
An attacker can bypass restrictions via Cookies of Tornado, in order to escalate his privileges...
mcabber: information disclosure via Roster Push
An attacker can bypass access restrictions to data via Roster Push of mcabber, in order to obtain sensitive information...
Perl SOAP-Lite: denial of service via XML Billion Laughs
An attacker can generate a fatal error via XML Billion Laughs of Perl SOAP-Lite, in order to trigger a denial of service...
Linux kernel: memory corruption via mpi_powm
An attacker can generate a memory corruption via mpi_powm() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
libgc: integer overflow
An attacker can generate an integer overflow of libgc, in order to trigger a denial of service, and possibly to run code...
phpMyAdmin: multiple vulnerabilities
An attacker can use several vulnerabilities of phpMyAdmin...
GStreamer Plugin: three vulnerabilities
An attacker can use several vulnerabilities of GStreamer Plugin...
mujs: multiple vulnerabilities
An attacker can use several vulnerabilities of mujs...
Moodle: three vulnerabilities
An attacker can use several vulnerabilities of Moodle...
LXC: privilege escalation via lxc-attach
An attacker can bypass restrictions via lxc-attach of LXC, in order to escalate his privileges...
WordPress Gallery Images: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gallery Images, in order to run JavaScript code in the context of the web site...
ICU: buffer overflow via locid.cpp
An attacker can generate a buffer overflow via locid.cpp of icu, in order to trigger a denial of service, and possibly to run code...
libuv: buffer overflow via Windows Console
An attacker can generate a buffer overflow via Windows Console of libuv, in order to trigger a denial of service, and possibly to run code...
WordPress FancyBox: information disclosure
An attacker can bypass access restrictions to data of WordPress FancyBox, in order to obtain sensitive information...
gnuchess: denial of service
An attacker can generate a fatal error of gnuchess, in order to trigger a denial of service...
LibTIFF: eight vulnerabilities
An attacker can use several vulnerabilities of LibTIFF...
VMware vCenter Server, VMware vSphere Client: three vulnerabilities
Several vulnerabilities were announced in VMware vCenter Server and VMware vSphere Client...
Monit: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Monit, in order to force the victim to perform operations...
Dovecot: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Dovecot, in order to read or write data in the session...
vim: code execution via Modeline
An attacker can use a vulnerability via Modeline of vim, in order to run code...
Nagios: privilege escalation via /etc/init.d/nagios
A local attacker can create a file for the startup script /etc/init.d/nagios of Nagios, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 654 655 656 657 658 659 660 661 662 664 666 667 668 669 670 671 672 673 674 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020