The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM DB2: buffer overflow via db2exmig/db2exfmt
An attacker can generate a buffer overflow via db2exmig/db2exfmt of IBM DB2, in order to trigger a denial of service, and possibly to run code...
Python: denial of service via I/O Stream Concurrence
An attacker can generate a fatal error via I/O Stream Concurrence of Python, in order to trigger a denial of service...
procps: multiple vulnerabilities
An attacker can use several vulnerabilities of procps...
Joomla Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
FortiOS: privilege escalation via USB Storage Device
An attacker can bypass restrictions via USB Storage Device of FortiOS, in order to escalate his privileges...
FortiOS: information disclosure via Crafted URLs
An attacker can bypass access restrictions to data via Crafted URLs of FortiOS, in order to obtain sensitive information...
OpenStack Cinder: information disclosure via ScaleIO Volumes
An attacker can bypass access restrictions to data via ScaleIO Volumes of OpenStack Cinder, in order to obtain sensitive information...
OpenJPEG2: buffer overflow via pgxtovolume
An attacker can generate a buffer overflow via pgxtovolume() of OpenJPEG2, in order to trigger a denial of service, and possibly to run code...
OpenJPEG2: buffer overflow via pgxtoimage
An attacker can generate a buffer overflow via pgxtoimage() of OpenJPEG2, in order to trigger a denial of service, and possibly to run code...
OpenJPEG2: use after free via j2k_read_ppm_v3
An attacker can force the usage of a freed memory area via j2k_read_ppm_v3() of OpenJPEG2, in order to trigger a denial of service, and possibly to run code...
VMWare Workstation: NULL pointer dereference via RPC Handler
An attacker can force a NULL pointer to be dereferenced via RPC Handler of VMWare Workstation, in order to trigger a denial of service...
Joomla EkRishta: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla EkRishta, in order to run JavaScript code in the context of the web site...
Linux kernel: denial of service via etm_setup_aux
An attacker can generate a fatal error via etm_setup_aux() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: denial of service via Session Keyrings Creation
An attacker can generate a fatal error via Session Keyrings Creation of the Linux kernel, in order to trigger a denial of service...
Processors: information disclosure via System Register
A local attacker can read a memory fragment via System Register of some processors, in order to obtain sensitive information...
Processors: information disclosure via Speculative Store
A local attacker can read a memory fragment via Speculative Store of some processors, in order to obtain sensitive information...
Linux kernel: privilege escalation via proc_pid_cmdline_read and environ_read
An attacker can bypass restrictions via proc_pid_cmdline_read() and environ_read() of the Linux kernel, in order to escalate his privileges...
ISC BIND: assertion error via serve-stale
An attacker can force an assertion error via serve-stale of ISC BIND, in order to trigger a denial of service...
ISC BIND: denial of service via Zone Transfer Succession
An attacker can generate a fatal error via Zone Transfer Succession of ISC BIND, in order to trigger a denial of service...
glibc: buffer overflow via realpath
An attacker can generate a buffer overflow via realpath() of glibc, in order to trigger a denial of service, and possibly to run code...
Exiv2: infinite loop via Exiv2-Image-printIFDStructure
An attacker can generate an infinite loop via Exiv2::Image::printIFDStructure() of Exiv2, in order to trigger a denial of service...
Exiv2: out-of-bounds memory reading via Exiv2-getULong
An attacker can force a read at an invalid address via Exiv2::getULong() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
Exiv2: out-of-bounds memory reading via Exiv2-Image-byteSwap4
An attacker can force a read at an invalid address via Exiv2::Image::byteSwap4() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
Gitlab: privilege escalation via Auth0
An attacker can bypass restrictions via Auth0 of Gitlab, in order to escalate his privileges...
Gitlab: information disclosure via Private Project Names
An attacker can bypass access restrictions to data via Private Project Names of Gitlab, in order to obtain sensitive information...
ImageMagick: out-of-bounds memory reading via ReadSIXELImage
An attacker can force a read at an invalid address via ReadSIXELImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
Apache ZooKeeper: privilege escalation via Quorum Cluster Join
An attacker can bypass restrictions via Quorum Cluster Join of Apache ZooKeeper, in order to escalate his privileges...
lilypond: code execution via BROWSER Environment Variable
An attacker can use a vulnerability via BROWSER Environment Variable of lilypond, in order to run code...
Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Thunderbird...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 820 821 822 823 824 825 826 827 828 830 832 833 834 835 836 837 838 839 840 841 861 881 901 921 941 961 981 1001 1013