The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle Java: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...
Apache OpenJPA: code execution via BrokerFactory
An attacker can use a vulnerability via BrokerFactory of Apache OpenJPA, in order to run code...
Oracle Fusion Middleware: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...
Oracle Communications Order and Service Management: information disclosure via WebUI
An attacker can bypass access restrictions to data via WebUI of Oracle Communications Order and Service Management, in order to obtain sensitive information...
Oracle Database: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...
Linux kernel: denial of service via kill_something_info INT_MIN
An attacker can generate a fatal error via kill_something_info() and -INT_MIN of the Linux kernel, in order to trigger a denial of service...
Python Core: denial of service via Wave_read._read_fmt_chunk
An attacker can generate a fatal error via Wave_read._read_fmt_chunk() of Python Core, in order to trigger a denial of service...
Gunicorn: HTTP header injection via CRLF Sequences
An attacker can bypass access restrictions via CRLF Sequences of Gunicorn, in order to alter data...
PowerDNS Recursor: Man-in-the-Middle via NXDOMAIN Answer
An attacker can act as a Man-in-the-Middle via NXDOMAIN Answer on PowerDNS Recursor, in order to read or write data in the session...
Corosync: denial of service
An attacker can generate a fatal error of Corosync, in order to trigger a denial of service...
libxls: memory corruption via xls_addCell
An attacker can generate a memory corruption via xls_addCell() of libxls, in order to trigger a denial of service, and possibly to run code...
libxls: integer overflow via xls_appendSST
An attacker can generate an integer overflow via xls_appendSST() of libxls, in order to trigger a denial of service, and possibly to run code...
libxls: buffer overflow via xls_getfcell
An attacker can generate a buffer overflow via xls_getfcell() of libxls, in order to trigger a denial of service, and possibly to run code...
libxls: memory corruption via read_MSAT
An attacker can generate a memory corruption via read_MSAT() of libxls, in order to trigger a denial of service, and possibly to run code...
libxls: memory corruption via xls_mergedCells
An attacker can generate a memory corruption via xls_mergedCells() of libxls, in order to trigger a denial of service, and possibly to run code...
OpenSSL: information disclosure via RSA Constant Time Key Generation
An attacker can bypass access restrictions to data via RSA Constant Time Key Generation of OpenSSL, in order to obtain sensitive information...
Tomcat: Cross Site Scripting via Manager Application IE
An attacker can trigger a Cross Site Scripting via Manager Application IE of Tomcat, in order to run JavaScript code in the context of the web site...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
LibreOffice: buffer overflow via SwCTBWrapper-Read
An attacker can generate a buffer overflow via SwCTBWrapper::Read() of LibreOffice, in order to trigger a denial of service, and possibly to run code...
LibreOffice: use after free via StgSmallStrm
An attacker can force the usage of a freed memory area via StgSmallStrm of LibreOffice, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via kernel_wait4
An attacker can generate a fatal error via kernel_wait4() of the Linux kernel, in order to trigger a denial of service...
Perl Core: buffer overflow via Perl__byte_dump_string
An attacker can generate a buffer overflow via Perl__byte_dump_string of Perl Core, in order to trigger a denial of service, and possibly to run code...
Perl Core: buffer overflow via S_regatom
An attacker can generate a buffer overflow via S_regatom of Perl Core, in order to trigger a denial of service, and possibly to run code...
ruby-loofah: code execution via Code Injection
An attacker can use a vulnerability via Code Injection of ruby-loofah, in order to run code...
Perl Core: buffer overflow via S_pack_rec
An attacker can generate a buffer overflow via S_pack_rec of Perl Core, in order to trigger a denial of service, and possibly to run code...
IBM MQ 8.0: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM MQ...
Joomla Watchfulli SSO: security improvement
The security of Joomla Watchfulli SSO was improved...
WordPress WP Background Takeover Advertisements: directory traversal
An attacker can traverse directories of WordPress WP Background Takeover Advertisements, in order to read a file outside the service root path...
Linux kernel: NULL pointer dereference via hi3660_stub_clk_probe
An attacker can force a NULL pointer to be dereferenced via hi3660_stub_clk_probe() of the Linux kernel, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 810 811 812 813 814 815 816 817 818 820 822 823 824 825 826 827 828 829 830 841 861 881 901 921 941 961 981 1001 1021 1041 1047