The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla JE Grid Folio: SQL injection
An attacker can use a SQL injection of Joomla JE Grid Folio, in order to read or alter data...
Joomla JE Property Finder: SQL injection
An attacker can use a SQL injection of Joomla JE Property Finder, in order to read or alter data...
Joomla JomWall: SQL injection
An attacker can use a SQL injection of Joomla JomWall, in order to read or alter data...
Joomla Joomloc-CAT: SQL injection
An attacker can use a SQL injection of Joomla Joomloc-CAT, in order to read or alter data...
Mcabber: privilege escalation via Carbons
An attacker can bypass restrictions via Carbons of Mcabber, in order to escalate his privileges...
QEMU: code execution via NBD drop_sync
An attacker can use a vulnerability via NBD drop_sync() of QEMU, in order to run code...
QEMU: buffer overflow via the Ethernet VLAN header
An attacker can generate a buffer overflow sending Ethernet frames with a VLAN header to a guest system in QEMU, in order to trigger a denial of service against the host system, and possibly to run code...
Linux kernel: privilege escalation via sys_perf_event_open
An attacker can bypass restrictions via sys_perf_event_open() on the Linux kernel, in order to escalate his privileges...
Linux kernel: use after free via IPV6_RECVPKTINFO
An attacker can force the usage of a freed memory area via IPV6_RECVPKTINFO on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
sshrc: vulnerability
A vulnerability of sshrc was announced...
ZoneMinder: file reading
A local attacker can read a file of ZoneMinder, in order to obtain sensitive information...
Openfire: denial of service via SASL
When authentication is delegated, an attacker can start an authentication attempt via SASL from Openfire, in order to trigger a denial of service...
Python Peewee: vulnerability via Limit/Offset
A vulnerability via Limit/Offset of Python Peewee was announced...
NetBSD: two vulnerabilities via ARP requests
An attacker can use several vulnerabilities via the ARP implementation of NetBSD...
GStreamer: out-of-bounds memory reading via psdemux
An attacker can force a read at an invalid address via psdemux of GStreamer, in order to trigger a denial of service, or to obtain sensitive information...
GStreamer: use after free via mxfdemux
An attacker can force the usage of a freed memory area via mxfdemux of GStreamer, in order to trigger a denial of service, and possibly to run code...
GStreamer: memory corruption via asfdemux
An attacker can generate a memory corruption via asfdemux of GStreamer, in order to trigger a denial of service, and possibly to run code...
GStreamer: memory corruption via asfdemux
An attacker can generate a memory corruption via asfdemux of GStreamer, in order to trigger a denial of service, and possibly to run code...
GStreamer: out-of-bounds memory reading via qtdemux
An attacker can force a read at an invalid address via qtdemux of GStreamer, in order to trigger a denial of service, or to obtain sensitive information...
GStreamer: out-of-bounds memory reading via aacparse
An attacker can force a read at an invalid address via aacparse of GStreamer, in order to trigger a denial of service, or to obtain sensitive information...
GStreamer: denial of service via Floating Point Exception
An attacker can generate a fatal error via Floating Point Exception of GStreamer, in order to trigger a denial of service...
GStreamer: denial of service via Floating Point Exception
An attacker can generate a fatal error via Floating Point Exception of GStreamer, in order to trigger a denial of service...
Wireshark: infinite loop via STANAG 4607
An attacker can generate an infinite loop via STANAG 4607 of Wireshark, in order to trigger a denial of service...
Firebird: privilege escalation via UdfAccess
An attacker can bypass restrictions via UdfAccess of Firebird, in order to escalate his privileges...
VMware Tools: privilege escalation via libDeployPkg
An attacker can bypass restrictions via libDeployPkg of VMware Tools, in order to escalate his privileges...
MuPDF: buffer overflow
An attacker can generate a buffer overflow of MuPDF, in order to trigger a denial of service, and possibly to run code...
mupdf: two vulnerabilities
An attacker can use several vulnerabilities of mupdf...
jBCrypt: integer overflow via crypt_raw
An attacker can generate an integer overflow via crypt_raw of jBCrypt, in order to trigger a denial of service, and possibly to run code...
Joomla Spider Facebook: SQL injection
An attacker can use a SQL injection of Joomla Spider Facebook, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 677 678 679 680 681 682 683 684 685 687 689 690 691 692 693 694 695 696 697 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1059