The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ImageMagick: denial of service via MogrifyImageList
An attacker can generate a fatal error via MogrifyImageList() of ImageMagick, in order to trigger a denial of service...
ImageMagick: NULL pointer dereference via LogOpenCLBuildFailure
An attacker can force a NULL pointer to be dereferenced via LogOpenCLBuildFailure() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via GetImagePixelCache
An attacker can create a memory leak via GetImagePixelCache() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via PersistPixelCache
An attacker can create a memory leak via PersistPixelCache() of ImageMagick, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via dccp_write_xmit
An attacker can force a NULL pointer to be dereferenced via dccp_write_xmit() of the Linux kernel, in order to trigger a denial of service...
Knot DNS Resolver: denial of service via DNS Messages
An attacker can generate a fatal error via DNS Messages of Knot DNS Resolver, in order to trigger a denial of service...
PAPI: code execution via Partial Build Flags Injection
An attacker can use a vulnerability via Partial Build Flags Injection of PAPI, in order to run code...
Perl Dancer2: multiple vulnerabilities
An attacker can use several vulnerabilities of Perl Dancer2...
CKEditor: Cross Site Scripting via Enhanced Image
An attacker can trigger a Cross Site Scripting via Enhanced Image of CKEditor, in order to run JavaScript code in the context of the web site...
Firebird: code execution via UDF Libraries
An attacker can use a vulnerability via UDF Libraries of Firebird, in order to run code...
Drupal SVG Formatter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal SVG Formatter, in order to run JavaScript code in the context of the web site...
Drupal Scrollable Content: vulnerability
A vulnerability of Drupal Scrollable Content was announced...
Drupal Simple Taxonomy Revision: vulnerability
A vulnerability of Drupal Simple Taxonomy Revision was announced...
Drupal KCFinder Integration: vulnerability
A vulnerability of Drupal KCFinder Integration was announced...
Drupal Multi-Step Registration: vulnerability
A vulnerability of Drupal Multi-Step Registration was announced...
Prosody: denial of service via Stream Error Messages
An attacker can generate a fatal error via Stream Error Messages of Prosody, in order to trigger a denial of service...
PostgreSQL: log rotation via adminpack pg_logfile_rotate
An attacker can bypass restrictions via adminpack pg_logfile_rotate() of PostgreSQL, in order to rotate logs...
Spring Integration Zip: directory traversal
An attacker can traverse directories of Spring Integration Zip, in order to create a file outside the service root path. This vulnerability is a member of the Zip Slip family (VIGILANCE-VUL-26357)...
Spring Security OAuth: code execution
An attacker can use a vulnerability of Spring Security OAuth, in order to run code...
Spring Data: external XML entity injection
An attacker can transmit malicious XML data to Spring Data, in order to read a file, scan sites, or trigger a denial of service...
Spring Framework: privilege escalation via Spring Security Method
An attacker can bypass restrictions via Spring Security Method of Spring Framework, in order to escalate his privileges...
Spring Framework: denial of service via Spring-messaging
An attacker can generate a fatal error via Spring-messaging of Spring Framework, in order to trigger a denial of service...
SAP: multiples vulnerabilities of May 2018
An attacker can use several vulnerabilities of SAP products...
Pulse Secure Connect Secure: denial of service via Nested XML Entities
An attacker can generate a fatal error via Nested XML Entities of Pulse Secure Connect Secure, in order to trigger a denial of service...
Firefox: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox...
Google Android/Pixel: multiple vulnerabilities of May 2018
An attacker can use several vulnerabilities of Google Android/Pixel...
LibTIFF: memory leak via TIFFClientOpen
An attacker can create a memory leak via TIFFClientOpen() of LibTIFF, in order to trigger a denial of service...
LibTIFF: out-of-bounds memory reading via TIFFWriteScanline
An attacker can force a read at an invalid address via TIFFWriteScanline() of LibTIFF, in order to trigger a denial of service, or to obtain sensitive information...
WebKitGTK+: memory corruption via State Management
An attacker can generate a memory corruption via State Management of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 817 818 819 820 821 822 823 824 825 827 829 830 831 832 833 834 835 836 837 841 861 881 901 921 941 961 981 1001 1021 1024