The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ImageMagick: out-of-bounds memory reading via Magick_png_read_raw_profile
An attacker can force a read at an invalid address via Magick_png_read_raw_profile() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: use after free via Magick-Image-read
An attacker can force the usage of a freed memory area via Magick::Image::read() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
Thunderbird: four vulnerabilities
An attacker can use several vulnerabilities of Thunderbird...
Ruby: code execution via lazy_initialze
An attacker can use a vulnerability via lazy_initialze() of Ruby, in order to run code...
Enigmail: multiple vulnerabilities
An attacker can use several vulnerabilities of Enigmail...
Joomla B2j Contact: vulnerability
A vulnerability of Joomla B2j Contact was announced...
WordPress Feed Statistics: open redirect
An attacker can deceive the user of WordPress Feed Statistics, in order to redirect him to a malicious site...
Linux kernel: privilege escalation via construct_get_dest_keyring
An attacker can bypass restrictions via construct_get_dest_keyring() of the Linux kernel, in order to escalate his privileges...
Linux kernel: buffer overflow via HMAC
An attacker can generate a buffer overflow via HMAC of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via Salsa20
An attacker can force the usage of a freed memory area via Salsa20 of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
ImageMagick: memory leak via ReadSGIImage
An attacker can create a memory leak via ReadSGIImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via ReadWEBPImage
An attacker can create a memory leak via ReadWEBPImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via ReadSUNImage
An attacker can create a memory leak via ReadSUNImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WriteCALSImage
An attacker can create a memory leak via WriteCALSImage() of ImageMagick, in order to trigger a denial of service...
F5 BIG-IP APM: information disclosure via Log File
An attacker can bypass access restrictions to data via Log File of F5 BIG-IP APM, in order to obtain sensitive information...
F5 BIG-IP: denial of service via TCP Fast Open/Tail
An attacker can generate a fatal error via TCP Fast Open/Tail of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via TMM Packet Sequence
An attacker can generate a fatal error via TMM Packet Sequence of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via iControl REST
An attacker can bypass restrictions via iControl REST of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: memory corruption via TLS1.2
An attacker can generate a memory corruption via TLS1.2 of F5 BIG-IP, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: denial of service via HTTP/2
An attacker can generate a fatal error via HTTP/2 of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via Normalized URI
An attacker can generate a fatal error via Normalized URI of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: memory leak via IP
An attacker can create a memory leak via IP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via HTTP
An attacker can send malicious HTTP packets to F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via TMM
An attacker can generate a fatal error via TMM of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: use after free via VPN
An attacker can force the usage of a freed memory area via VPN of F5 BIG-IP APM, in order to trigger a denial of service, and possibly to run code...
Drupal Me Aliases: code execution
An attacker can use a vulnerability of Drupal Me Aliases, in order to run code...
Drupal Directory Based Organisational Layer: vulnerability
A vulnerability of Drupal Directory Based Organisational Layer was announced...
Drupal ComScore Direct Tag: vulnerability
A vulnerability of Drupal ComScore Direct Tag was announced...
Drupal Link Click Count: vulnerability
A vulnerability of Drupal Link Click Count was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 776 777 778 779 780 781 782 783 784 786 788 789 790 791 792 793 794 795 796 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104