The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 GraphicsMagick: memory leak via WriteGIFImage
An attacker can create a memory leak via WriteGIFImage() of GraphicsMagick, in order to trigger a denial of service...
1 GraphicsMagick: memory leak via ReadPCDImage
An attacker can create a memory leak via ReadPCDImage() of GraphicsMagick, in order to trigger a denial of service...
1 GraphicsMagick: memory leak via CloneImage
An attacker can create a memory leak via CloneImage() of GraphicsMagick, in order to trigger a denial of service...
2 Quassel: denial of service via Login Attempts
An attacker can generate a fatal error via Login Attempts of Quassel, in order to trigger a denial of service...
3 Quassel: memory corruption via qdatastream
An attacker can generate a memory corruption via qdatastream of Quassel, in order to trigger a denial of service, and possibly to run code...
2 WavPack: multiple vulnerabilities
An attacker can use several vulnerabilities of WavPack...
2 WebKitGTK+: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK+...
3 Chrome: use after free via Media Cache
An attacker can force the usage of a freed memory area via Media Cache of Chrome, in order to trigger a denial of service, and possibly to run code...
2 VMware vCloud Director: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of VMware vCloud Director, in order to force the victim to perform operations...
2 F5 BIG-IP: denial of service via RADIUS Authentication Responses
An attacker can generate a fatal error via RADIUS Authentication Responses of F5 BIG-IP, in order to trigger a denial of service...
3 F5 BIG-IP: denial of service via LRO SYN Cookies
An attacker can generate a fatal error via LRO SYN Cookies of F5 BIG-IP, in order to trigger a denial of service...
1 F5 BIG-IP: read-write access via ssldump
An attacker can bypass access restrictions via ssldump of F5 BIG-IP, in order to read or alter data...
2 F5 BIG-IP: denial of service via HTTP/2
An attacker can generate a fatal error via HTTP/2 of F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: file reading via tmsh
A local attacker can read a file via tmsh of F5 BIG-IP, in order to obtain sensitive information...
3 F5 BIG-IP: denial of service via FastL4 TCP Self IP Address
An attacker can generate a fatal error via FastL4 TCP Self IP Address of F5 BIG-IP, in order to trigger a denial of service...
1 F5 BIG-IP: denial of service via vCMP Guest
An attacker can generate a fatal error via vCMP Guest of F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: file reading via dig
A local attacker can read a file via dig of F5 BIG-IP, in order to obtain sensitive information...
2 libvorbis: out-of-bounds memory reading via vorbis_analysis_wrote
An attacker can force a read at an invalid address via vorbis_analysis_wrote() of libvorbis, in order to trigger a denial of service, or to obtain sensitive information...
2 GlusterFS: privilege escalation via gluster_shared_storage
An attacker can bypass restrictions via gluster_shared_storage of GlusterFS, in order to escalate his privileges...
2 gSOAP: infinite loop via DIME Protocol Messages
An attacker can generate an infinite loop via DIME Protocol Messages of gSOAP, in order to trigger a denial of service...
2 Linux kernel: privilege escalation via Ptrace Hardware Breakpoint Settings
An attacker can bypass restrictions via Ptrace Hardware Breakpoint Settings of the Linux kernel, in order to escalate his privileges...
2 Linux kernel: NULL pointer dereference via flush_cmd_control
An attacker can force a NULL pointer to be dereferenced via flush_cmd_control of the Linux kernel, in order to trigger a denial of service...
2 Linux kernel: use after free via blk_mq_tag_to_rq
An attacker can force the usage of a freed memory area via blk_mq_tag_to_rq() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
3 OpenVPN: use after free via Interactive Service
An attacker can force the usage of a freed memory area via Interactive Service of OpenVPN, in order to trigger a denial of service, and possibly to run code...
2 Boost: integer overflow via max_state_count
An attacker can generate an integer overflow via max_state_count of Boost, in order to trigger a denial of service, and possibly to run code...
2 PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
4 Drupal DRD Agent: code execution via PHP Object Injection
An attacker can use a vulnerability via PHP Object Injection of Drupal DRD Agent, in order to run code...
2 Drupal JSON API: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal JSON API, in order to force the victim to perform operations...
4 Drupal Media: code execution
An attacker can use a vulnerability of Drupal Media, in order to run code...
2 Undertow: HTTP header injection
An attacker can inject HTTP headers in Undertow, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 814 815 816 817 818 819 820 821 822 824 826 827 828 829 830 831 832 833 834 841 861 881 901 921 941 961 981 996