The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Apple iOS, macOS: memory corruption
An attacker can generate a memory corruption of Apple iOS et macOS, in order to trigger a denial of service, and possibly to run code...
FFmpeg: three vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
rrdtool: vulnerability
A vulnerability of rrdtool was announced...
Sophos XG Series: directory traversal
An attacker can traverse directories of Sophos XG Series, in order to read a file outside the service root path...
Microsoft Edge: privilege escalation by bypassing the ACG feature
An attacker can bypass the ACG feature of Microsoft Edge which protects against JavaScript exploits, in order to escalate his privileges...
Joomla jGive: SQL injection
An attacker can use a SQL injection of Joomla jGive, in order to read or alter data...
Joomla MediaLibrary Free: SQL injection
An attacker can use a SQL injection of Joomla MediaLibrary Free, in order to read or alter data...
ISC BIND: assertion error via DNSSEC
An attacker can force an assertion error via DNSSEC of ISC BIND, in order to trigger a denial of service...
mupdf: use after free via fz_keep_key_storable
An attacker can force the usage of a freed memory area via fz_keep_key_storable() of mupdf, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: two vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
WordPress UltimateMember: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress UltimateMember, in order to run JavaScript code in the context of the web site...
Node.js hoek: denial of service via JSON
An attacker can generate a fatal error via JSON of Node.js hoek, in order to trigger a denial of service...
irssi: five vulnerabilities
An attacker can use several vulnerabilities of irssi...
glibc: three vulnerabilities
An attacker can use several vulnerabilities of glibc...
Quagga: four vulnerabilities via BGP
An attacker can use several vulnerabilities via BGP of Quagga...
Trend Micro OfficeScan: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Trend Micro OfficeScan, in order to execute code...
python-crypto: weak key generation
An attacker can bypass access restrictions to data of python-crypto, in order to obtain sensitive information...
Node ssri: infinite loop via a regular expression
An attacker can generate an endless loop in Node ssri via a regular expression, in order to trigger a denial of service...
EMC NetWorker vProxy: vulnerability via the embeded Linux kernel
A vulnerability of the Linux kernel embeded in EMC NetWorker vProxy was announced...
FreeType: denial of service
An attacker can generate a fatal error of FreeType, in order to trigger a denial of service...
Jenkins Core LTS: three vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core LTS...
mujs: two vulnerabilities
An attacker can use several vulnerabilities of mujs...
Drupal Entity API: information disclosure via the debugging output
An attacker can read debug output from Drupal Entity API, in order to get sensitive information...
Drupal Dynamic Banner: vulnerability
A vulnerability of Drupal Dynamic Banner was announced...
Drupal Entity Backup: vulnerability
A vulnerability of Drupal Entity Backup was announced...
Drupal Custom Permissions: privilege escalation
An attacker can bypass restrictions of Drupal Custom Permissions, in order to escalate his privileges...
Drupal VChess: vulnerability
A vulnerability of Drupal VChess was announced...
Google Chrome: memory corruption via V8
An attacker can generate a memory corruption via V8 of Google Chrome, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 791 792 793 794 795 796 797 798 799 801 803 804 805 806 807 808 809 810 811 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1069