The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: memory corruption via RXRPC Key
An attacker can generate a memory corruption via RXRPC Key on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
ImageMagick: two vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
Puppet Enterprise: denial of service via RBAC/Classifier
An attacker can generate a fatal error via RBAC/Classifier of Puppet Enterprise, in order to trigger a denial of service...
Linux kernel: privilege escalation via Debug Exception
An attacker can bypass restrictions via Debug Exception on the Linux kernel, in order to escalate his privileges...
WebKitGTK+: memory corruption
An attacker can generate a memory corruption of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...
LibTIFF: memory leak via TIFFReadDirEntryLong8Array
An attacker can create a memory leak via TIFFReadDirEntryLong8Array() of LibTIFF, in order to trigger a denial of service...
unrar: memory corruption via VMSF_DELTA
An attacker can generate a memory corruption via VMSF_DELTA of unrar, in order to trigger a denial of service, and possibly to run code...
IBM DB2: buffer overflow via Command Line Process
An attacker can generate a buffer overflow via Command Line Process of IBM DB2, in order to trigger a denial of service, and possibly to run code...
IBM DB2: buffer overflow
An attacker can generate a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via saa7164-bus.c
An attacker can generate a memory corruption via saa7164-bus.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Flatpak: privilege escalation via Third-party Repositories
An attacker can bypass restrictions via Third-party Repositories of Flatpak, in order to escalate his privileges...
c-ares: out-of-bounds memory reading via NAPTR
An attacker can force a read at an invalid address via NAPTR of c-ares, in order to trigger a denial of service, or to obtain sensitive information...
LOVE: vulnerability
A vulnerability of LOVE was announced...
Cisco Unified Contact Center Express: privilege escalation via XMPP
An attacker can bypass restrictions via XMPP of Cisco Unified Contact Center Express, in order to escalate his privileges...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
Cisco Prime Infrastructure: SQL injection
An attacker can use a SQL injection of Cisco Prime Infrastructure, in order to read or alter data...
Cisco IOS XR: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco IOS XR, in order to escalate his privileges...
Cisco IOS XR: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco IOS XR, in order to escalate his privileges...
Cisco ASR 5000: denial of service via IPsec VPN Tunnel
An attacker can generate a fatal error via IPsec VPN Tunnel of Cisco ASR 5000, in order to trigger a denial of service...
IBM WebSphere MQ: denial of service via MQXR
An attacker can generate a fatal error via MQXR of IBM WebSphere MQ, in order to trigger a denial of service...
Wireshark: infinite loop via PROFINET IO
An attacker can generate an infinite loop via PROFINET IO of Wireshark, in order to trigger a denial of service...
OpenVPN: denial of service via asn1_buf_to_c_string
An attacker can generate a fatal error via asn1_buf_to_c_string() of OpenVPN, in order to trigger a denial of service...
OpenVPN: memory leak via OpenSSL Certificate Parsing
An attacker can create a memory leak via OpenSSL Certificate Parsing of OpenVPN, in order to trigger a denial of service...
Drupal Core: three vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...
Drupal Search 404: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Search 404, in order to run JavaScript code in the context of the web site...
Cisco Prime Infrastructure: external XML entity injection
An attacker can transmit malicious XML data to Cisco Prime Infrastructure, in order to run code, read a file, scan sites, or trigger a denial of service...
OpenVPN: use after free via Certificate Parsing
An attacker can force the usage of a freed memory area via Certificate Parsing of OpenVPN, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 716 717 718 719 720 721 722 723 724 726 728 729 730 731 732 733 734 735 736 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021