The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Poppler: out-of-bounds memory reading via GfxImageColorMap-getGray
An attacker can force a read at an invalid address via GfxImageColorMap::getGray() of Poppler, in order to trigger a denial of service, or to obtain sensitive information...
poppler: integer overflow via JBIG2Stream.cc
An attacker can generate an integer overflow via JBIG2Stream.cc of poppler, in order to trigger a denial of service, and possibly to run code...
OpenVAS: file corruption via Ovaldi Support
A local attacker can create a symbolic link when Ovaldi Support is enabled, in order to alter the pointed file, with privileges of OpenVAS...
QEMU: memory corruption via qemu_map_ram_ptr
An attacker, inside a guest system, can generate a memory corruption via qemu_map_ram_ptr of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Evince: code execution via Comic Book Archives
An attacker can use a vulnerability via Comic Book Archives of Evince, in order to run code...
knot: privilege escalation via Signature Forgery
An attacker can bypass restrictions via Signature Forgery of knot, in order to escalate his privileges...
Packet Filter: infinite loop via LB Rule
An attacker can generate an infinite loop via LB Rule of Packet Filter, in order to trigger a denial of service...
Apache httpd: use after free via mod_http2
An attacker can force the usage of a freed memory area via mod_http2 of Apache httpd, in order to trigger a denial of service, and possibly to run code...
Apache httpd: information disclosure via mod_auth_digest
An attacker can bypass access restrictions to data via mod_auth_digest of Apache httpd, in order to obtain sensitive information...
IBM WebSphere MQ: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM WebSphere MQ...
Synology Download Station: two vulnerabilities
An attacker can use several vulnerabilities of Synology Download Station...
F5 BIG-IP: privilege escalation via iControl REST
An attacker can bypass restrictions via iControl REST of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via SSL Session Ticket
An attacker can generate a fatal error via SSL Session Ticket of F5 BIG-IP, in order to trigger a denial of service...
Apache Struts: denial of service via Spring Secured Actions
An attacker can generate a fatal error via Spring Secured Actions of Apache Struts, in order to trigger a denial of service...
Apache Struts: denial of service via URLValidator
An attacker can generate a fatal error via URLValidator of Apache Struts, in order to trigger a denial of service...
RSA Authentication Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of RSA Authentication Manager, in order to run JavaScript code in the context of the web site...
RSA Authentication Manager: privilege escalation via Brute Force PIN-Guessing
An attacker can bypass restrictions via Brute Force PIN-Guessing of RSA Authentication Manager, in order to escalate his privileges...
EMC VNX M&R: privilege escalation via Undocumented Accounts
An attacker can bypass restrictions via Undocumented Accounts of EMC VNX M&R, in order to escalate his privileges...
Drupal DrupalChat: two vulnerabilities
An attacker can use several vulnerabilities of Drupal DrupalChat...
Contao: file reading via PHP Back End
A local attacker can read a file via PHP Back End of Contao, in order to obtain sensitive information...
Junos OS: denial of service via BGP OPEN
An attacker can generate a fatal error via BGP OPEN of Junos OS, in order to trigger a denial of service...
ScreenOS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of ScreenOS, in order to run JavaScript code in the context of the web site...
Junos OS: privilege escalation via VM
An attacker can bypass restrictions via VM of Junos OS, in order to escalate his privileges...
Junos OS: denial of service via SRX DHCP
An attacker can send malicious SRX DHCP packets to Junos OS, in order to trigger a denial of service...
Junos OS: vulnerability via MACsec
A vulnerability via MACsec of Junos OS was announced...
Junos OS: privilege escalation via SRX UserFW
An attacker can bypass restrictions via SRX UserFW of Junos OS, in order to escalate his privileges...
Junos OS: buffer overflow via Sockets Library
An attacker can generate a buffer overflow via Sockets Library of Junos OS, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 722 723 724 725 726 727 728 729 730 732 734 735 736 737 738 739 740 741 742 761 781 801 821 841 861 881 901 921 941 961 981 1001 1014