The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
GNU Binutils: two vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: six vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: seven vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: denial of service via coff_set_alignment_hook
An attacker can generate a fatal error via coff_set_alignment_hook() of GNU Binutils, in order to trigger a denial of service...
GNU Binutils: seven vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: NULL pointer dereference via elflink.c
An attacker can force a NULL pointer to be dereferenced via elflink.c of GNU Binutils, in order to trigger a denial of service...
GNU Binutils: six vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: five vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: two vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: three vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: NULL pointer dereference via _get_synthetic_symtab
An attacker can force a NULL pointer to be dereferenced via _get_synthetic_symtab() of GNU Binutils, in order to trigger a denial of service...
GNU Binutils: integer overflow via _get_synthetic_symtab
An attacker can generate an integer overflow via _get_synthetic_symtab() of GNU Binutils, in order to trigger a denial of service, and possibly to run code...
GNU Binutils: buffer overflow via _get_synthetic_symtab
An attacker can generate a buffer overflow via _get_synthetic_symtab() of GNU Binutils, in order to trigger a denial of service, and possibly to run code...
GNU Binutils: out-of-bounds memory reading via pe_print_idata
An attacker can force a read at an invalid address via pe_print_idata() of GNU Binutils, in order to trigger a denial of service, or to obtain sensitive information...
GNU Binutils: integer overflow via process_version_sections
An attacker can generate an integer overflow via process_version_sections() of GNU Binutils, in order to trigger a denial of service, and possibly to run code...
GNU Binutils: three vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
GNU Binutils: out-of-bounds memory reading via elf_i386_get_synthetic_symtab
An attacker can force a read at an invalid address via elf_i386_get_synthetic_symtab() of GNU Binutils, in order to trigger a denial of service, or to obtain sensitive information...
GNU Binutils: buffer overflow via elf_read_notes
An attacker can generate a buffer overflow via elf_read_notes() of GNU Binutils, in order to trigger a denial of service, and possibly to run code...
GNU Binutils: twelve vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
LibreSSL: out-of-bounds memory reading via DES
An attacker can force a read at an invalid address via DES of LibreSSL, in order to trigger a denial of service, or to obtain sensitive information...
ncurses: buffer overflow via _nc_write_entry
An attacker can generate a buffer overflow via _nc_write_entry() of ncurses, in order to trigger a denial of service, and possibly to run code...
ncurses: six vulnerabilities
An attacker can use several vulnerabilities of ncurses...
OpenBSD: privilege escalation via fktrace
An attacker can bypass restrictions via fktrace of OpenBSD, in order to escalate his privileges...
Tor: multiple vulnerabilities
An attacker can use several vulnerabilities of Tor...
Asterisk: denial of service via chan_skinny
An attacker can generate a fatal error via chan_skinny of Asterisk, in order to trigger a denial of service...
QBittorrent: buffer overflow via bdecode
An attacker can generate a buffer overflow via bdecode() of QBittorrent, in order to trigger a denial of service, and possibly to run code...
Python Sanic: directory traversal via sanic/sanic/static.py
An attacker can traverse directories via sanic/sanic/static.py of Python Sanic, in order to read a file outside the service root path...
WordPress WooCommerce: directory traversal
An attacker can traverse directories of WordPress WooCommerce, in order to read a file outside the service root path...
Linux kernel: NULL pointer dereference via rngapi_reset
An attacker can force a NULL pointer to be dereferenced via rngapi_reset() of the Linux kernel, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 768 769 770 771 772 773 774 775 776 778 780 781 782 783 784 785 786 787 788 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103