The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ioQuake3: privilege escalation via Driver Settings
An attacker can bypass restrictions via Driver Settings of ioQuake3, in order to escalate his privileges...
Cisco IOS, IOS XE: code execution via CMP Telnet Options
An attacker can connect to the Telnet service, then send a special CMP Telnet Option to Cisco IOS or IOS XE, in order to run code...
OpenJPEG: buffer overflow via JPEG2000
An attacker can generate a buffer overflow via JPEG2000 of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: integer overflow via opj_aligned_malloc
An attacker can generate an integer overflow via opj_aligned_malloc() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: integer overflow via opj_tcd_init_tile
An attacker can generate an integer overflow via opj_tcd_init_tile() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via opj_tcd_init_tile
An attacker can generate a buffer overflow via opj_tcd_init_tile() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
irssi: use after free via netjoins
An attacker can force the usage of a freed memory area via netjoins of irssi, in order to trigger a denial of service, and possibly to run code...
Firefox: integer overflow via createImageBitmap
An attacker can generate an integer overflow via createImageBitmap of Firefox, in order to trigger a denial of service, and possibly to run code...
Deluge: Cross Site Request Forgery via WebUI
An attacker can trigger a Cross Site Request Forgery via WebUI of Deluge, in order to force the victim to perform operations...
R Lang: buffer overflow via LoadEncoding
An attacker can generate a buffer overflow via LoadEncoding of R Lang, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via keyring_search_aux
An attacker can force a NULL pointer to be dereferenced via keyring_search_aux() in the Linux kernel, in order to trigger a denial of service...
Tanuki Java Service Wrapper: buffer overflow via HostIds collection
An attacker can generate a buffer overflow via HostIds collection in Tanuki Java Service Wrapper, in order to trigger a denial of service, and possibly to run code...
Microsoft Skype: executing DLL code via api-ms-win-core-winrt-string-l1-1-0.dll
An attacker can create a malicious api-ms-win-core-winrt-string-l1-1-0.dll DLL, and then put it in the current directory of Microsoft Skype, in order to execute code...
Red Hat JBoss EAP: privilege escalation via /etc/sysconfig/jbossas
An attacker can bypass restrictions via /etc/sysconfig/jbossas of Red Hat JBoss EAP, in order to escalate his privileges...
Calibre: file reading via XMLHttpRequest
A local attacker can read a file via XMLHttpRequest of Calibre, in order to obtain sensitive information...
Joomla J-Hotel: SQL injection
An attacker can use a SQL injection of Joomla J-Hotel, in order to read or alter data...
libpng: buffer overflow via png_do_expand
An attacker can generate a buffer overflow via png_do_expand() of libpng, in order to trigger a denial of service, and possibly to run code...
Joomla AppointmentBookingPro: SQL injection
An attacker can use a SQL injection of Joomla AppointmentBookingPro, in order to read or alter data...
Cisco ASA: privilege escalation via BGP Bidirectional Forwarding
An attacker can bypass restrictions via BGP Bidirectional Forwarding of Cisco ASA, in order to escalate his privileges...
Cisco Nexus 7000: privilege escalation via Access-Control Bypass
An attacker can bypass restrictions via Access-Control Bypass of Cisco Nexus 7000, in order to escalate his privileges...
Cisco Prime Infrastructure: privilege escalation via API Credentials Management
An attacker can bypass restrictions via API Credentials Management of Cisco Prime Infrastructure, in order to escalate his privileges...
Cisco Nexus 9000: denial of service via Telnet Login
An attacker can generate a fatal error via Telnet Login of Cisco Nexus 9000, in order to trigger a denial of service...
Cisco Nexus 9000: denial of service via Remote Login
An attacker can generate a fatal error via Remote Login of Cisco Nexus 9000, in order to trigger a denial of service...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications Manager: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Unified Communications Manager, in order to force the victim to perform operations...
Cisco Web Security Appliance: privilege escalation via URL Filtering Bypass
An attacker can bypass restrictions via URL Filtering Bypass of Cisco Web Security Appliance, in order to escalate his privileges...
JasPer: buffer overflow
An attacker can generate a buffer overflow of JasPer, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 686 687 688 689 690 691 692 693 694 696 698 699 700 701 702 703 704 705 706 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1003