The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
MIT Kerberos: assertion error via krb5kdc S4U2Self/S4U2Proxy
An attacker can force an assertion error via krb5kdc S4U2Self/S4U2Proxy of MIT Kerberos, in order to trigger a denial of service...
librsvg2: denial of service via Gaussian Blur Code
An attacker can generate a fatal error via Gaussian Blur Code of librsvg2, in order to trigger a denial of service...
YARA: buffer overflow
An attacker can generate a buffer overflow of YARA, in order to trigger a denial of service, and possibly to run code...
Libtasn1: NULL pointer dereference via _asn1_check_identifier
An attacker can force a NULL pointer to be dereferenced via _asn1_check_identifier() of Libtasn1, in order to trigger a denial of service...
gSOAP: buffer overflow via 2GB Message
An attacker can generate a buffer overflow via a 2GB message for gSOAP, in order to trigger a denial of service, and possibly to run code...
ImageMagick: infinite loop via ReadOneDJVUImage
An attacker can generate an infinite loop via ReadOneDJVUImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via coders/jpeg.c
An attacker can generate a fatal error via coders/jpeg.c of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via coders/mpc.c
An attacker can generate a fatal error via coders/mpc.c of ImageMagick, in order to trigger a denial of service...
ImageMagick: information disclosure via ReadJPEGImage
A local attacker can read a memory fragment via ReadJPEGImage() of ImageMagick, in order to obtain sensitive information...
ImageMagick: memory leak via ReadSCREENSHOTImage
An attacker can create a memory leak via ReadSCREENSHOTImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via coders/rle.c
An attacker can generate a fatal error via coders/rle.c of ImageMagick, in order to trigger a denial of service...
Linux kernel: buffer overflow via brcmf_cfg80211_mgmt_tx
An attacker can generate a buffer overflow via brcmf_cfg80211_mgmt_tx() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
WordPress Simple Custom CSS and JS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Simple Custom CSS and JS, in order to run JavaScript code in the context of the web site...
WordPress Popup Maker: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Popup Maker, in order to run JavaScript code in the context of the web site...
WordPress WP Hide & Security Enhancer: directory traversal
An attacker can traverse directories of WordPress WP Hide & Security Enhancer, in order to read a file outside the service root path...
WordPress Arabic Font: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Arabic Font, in order to force the victim to perform operations...
WordPress Task Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Task Manager, in order to run JavaScript code in the context of the web site...
Linux kernel: infinite loop via ip6_find_1stfragopt
An attacker can generate an infinite loop via ip6_find_1stfragopt() of the Linux kernel, in order to trigger a denial of service...
tcpdump: multiple vulnerabilities
An attacker can use several vulnerabilities of tcpdump...
GraphicsMagick: use after free via CloseBlob
An attacker can force the usage of a freed memory area via CloseBlob() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via sys_mq_notify
An attacker can force the usage of a freed memory area via sys_mq_notify() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
GLPI: multiple vulnerabilities
An attacker can use several vulnerabilities of GLPI...
Cacti: Cross Site Scripting via auth_profile.php
An attacker can trigger a Cross Site Scripting via auth_profile.php of Cacti, in order to run JavaScript code in the context of the web site...
PAN-OS: code execution via DNS Proxy FQDN
An attacker can use a vulnerability via DNS Proxy FQDN of PAN-OS, in order to run code...
PAN-OS: Cross Site Scripting via GlobalProtect
An attacker can trigger a Cross Site Scripting via GlobalProtect of PAN-OS, in order to run JavaScript code in the context of the web site...
PAN-OS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site...
pfSense: privilege escalation via WebGUI
An attacker can bypass restrictions via WebGUI of pfSense, in order to escalate his privileges...
pfSense: Cross Site Scripting via WebGUI
An attacker can trigger a Cross Site Scripting via WebGUI of pfSense, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 725 726 727 728 729 730 731 732 733 735 737 738 739 740 741 742 743 744 745 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021