The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: denial of service via add_free_nid
An attacker can generate a fatal error via add_free_nid() of the Linux kernel, in order to trigger a denial of service...
CUPS: denial of service via Invalid UTF-8 Username
An attacker can generate a fatal error via Invalid UTF-8 Username of CUPS, in order to trigger a denial of service...
Firefox: use after free via Compositor
An attacker can force the usage of a freed memory area via Compositor of Firefox, in order to trigger a denial of service, and possibly to run code...
Screen Resolution Extra: privilege escalation via PolicyKit
An attacker can bypass restrictions via PolicyKit of Screen Resolution Extra, in order to escalate his privileges...
Joomla AcyMailing: privilege escalation via CSV Injection
An attacker can bypass restrictions via CSV Injection of Joomla AcyMailing, in order to escalate his privileges...
Node.js electron: code execution via Integration
An attacker can use a vulnerability via Integration of Node.js electron, in order to run code...
Openfire: Cross Site Scripting via Property Name
An attacker can trigger a Cross Site Scripting via Property Name of Openfire, in order to run JavaScript code in the context of the web site...
Synology Office: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology Office, in order to run JavaScript code in the context of the web site...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Simple Logging Facade for Java: code execution via EventData XML Deserialisation
An attacker can use a vulnerability via EventData XML Deserialisation of Simple Logging Facade for Java, in order to run code...
WordPress Events Manager: Cross Site Scripting via mapTitle
An attacker can trigger a Cross Site Scripting via mapTitle of WordPress Events Manager, in order to run JavaScript code in the context of the web site...
libmodplug: buffer overflow
An attacker can generate a buffer overflow of libmodplug, in order to trigger a denial of service, and possibly to run code...
librelp: buffer overflow via X.509
An attacker can generate a buffer overflow via X.509 of librelp, in order to trigger a denial of service, and possibly to run code...
SimpleSAMLphp: privilege escalation via XMLSecLibs
An attacker can bypass restrictions via XMLSecLibs of SimpleSAMLphp, in order to escalate his privileges...
Monitorix: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Monitorix, in order to run JavaScript code in the context of the web site...
ICU: integer overflow
An attacker can generate an integer overflow of ICU, in order to trigger a denial of service, and possibly to run code...
Cacti: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cacti, in order to run JavaScript code in the context of the web site...
Apache httpd: privilege escalation via mod_session CGI Applications
An attacker can bypass restrictions via mod_session CGI Applications of Apache httpd, in order to escalate his privileges...
Apache httpd: denial of service via mod_authnz_ldap
An attacker can generate a fatal error via mod_authnz_ldap of Apache httpd, in order to trigger a denial of service...
Apache httpd: file reading via FilesMatch Newline
A local attacker can read a file via FilesMatch Newline of Apache httpd, in order to obtain sensitive information...
Apache httpd: privilege escalation via mod_auth_digest
An attacker can bypass restrictions via mod_auth_digest of Apache httpd, in order to escalate his privileges...
Apache httpd: out-of-bounds memory reading via Request Reading Failure
An attacker can force a read at an invalid address via Request Reading Failure of Apache httpd, in order to trigger a denial of service, or to obtain sensitive information...
Apache httpd: use after free via HTTP/2 Stream Shutdown
An attacker can force the usage of a freed memory area via HTTP/2 Stream Shutdown of Apache httpd, in order to trigger a denial of service, and possibly to run code...
Apache httpd: out-of-bounds memory reading via mod_cache_socache
An attacker can force a read at an invalid address via mod_cache_socache of Apache httpd, in order to trigger a denial of service, or to obtain sensitive information...
Freeplane: external XML entity injection via Mindmap Loader
An attacker can transmit malicious XML data via Mindmap Loader to Freeplane, in order to read a file, scan sites, or trigger a denial of service...
UCOPIA Wireless Appliance: code execution via Shell Escape
An attacker can use a vulnerability via Shell Escape of UCOPIA Wireless Appliance, in order to run code...
SimpleSAMLphp: privilege escalation via Invalid Signature
An attacker can bypass restrictions via Invalid Signature of SimpleSAMLphp, in order to escalate his privileges...
Exim: out-of-bounds memory reading via b64decode
An attacker can force a read at an invalid address via b64decode() of Exim, in order to trigger a denial of service, or to obtain sensitive information...
Kamailio SIP: buffer overflow
An attacker can generate a buffer overflow of Kamailio SIP, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 802 803 804 805 806 807 808 809 810 812 814 815 816 817 818 819 820 821 822 841 861 881 901 921 941 961 981 1001 1021 1022