The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FreeBSD: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: memory corruption via RLIMIT_STACK Stack Clash
An attacker can generate a memory corruption via RLIMIT_STACK Stack Clash of FreeBSD, in order to trigger a denial of service, and possibly to run code...
NetBSD: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of NetBSD, in order to trigger a denial of service, and possibly to run code...
OpenBSD /usr/bin/at: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of OpenBSD /usr/bin/at, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via AMD64 PIE Executable
An attacker can generate a memory corruption via AMD64 PIE Executable on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
GRSecurity/PaX: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of Sudo on GRSecurity/PaX, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via Stack Size Restriction
An attacker can generate a memory corruption via Stack Size Restriction on the Linux kernel, which can be exploited for example by /bin/su on Debian, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via PIE Binary Offset2lib RLIM_INFINITY Bypass
An attacker can generate a memory corruption via PIE Binary Offset2lib RLIM_INFINITY Bypass on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via PIE Binary Offset2lib Bypass
An attacker can generate a memory corruption via PIE Binary Offset2lib Bypass on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Exim: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of Exim (with the -p option to extend the allocated memory), in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via Small Default Stack Guard Page
An attacker can generate a memory corruption via Small Default Stack Guard Page of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
glibc: privilege escalation via Setuid Stack
An attacker can bypass restrictions via Setuid Stack of glibc, in order to escalate his privileges...
Apache httpd: out-of-bounds memory reading via mod_mime
An attacker can force a read at an invalid address via mod_mime of Apache httpd, in order to trigger a denial of service, or to obtain sensitive information...
Apache httpd: out-of-bounds memory reading via ap_find_token
An attacker can force a read at an invalid address via ap_find_token() of Apache httpd, in order to trigger a denial of service, or to obtain sensitive information...
Apache httpd 2.4: NULL pointer dereference via mod_http2
An attacker can force a NULL pointer to be dereferenced via mod_http2 of Apache httpd, in order to trigger a denial of service...
Apache httpd: NULL pointer dereference via mod_ssl
An attacker can force a NULL pointer to be dereferenced via mod_ssl of Apache httpd, in order to trigger a denial of service...
Apache httpd: privilege escalation via ap_get_basic_auth_pw
An attacker can bypass restrictions of a module developed with ap_get_basic_auth_pw() of Apache httpd, in order to escalate his privileges...
WordPress WP Custom Fields Search: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Custom Fields Search, in order to run JavaScript code in the context of the web site...
WordPress Download Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Download Manager, in order to run JavaScript code in the context of the web site...
WordPress Photo Gallery: directory traversal
An attacker can traverse directories of WordPress Photo Gallery, in order to read a file outside the service root path...
WordPress WP Job Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Job Manager, in order to run JavaScript code in the context of the web site...
Trend Micro Internet Security: privilege escalation via ioctl
An attacker can use an ioctl call to Trend Micro Internet Security, in order to write to the kernel memory or trigger a denial of service...
Google chrome: three vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
golang: vulnerability via Elliptic curves
A vulnerability via Elliptic of golang was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 714 715 716 717 718 719 720 721 722 724 726 727 728 729 730 731 732 733 734 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021