The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 GraphicsMagick: infinite loop via MNG
An attacker can generate an infinite loop via MNG of GraphicsMagick, in order to trigger a denial of service...
2 GraphicsMagick: buffer overflow via JNG
An attacker can generate a buffer overflow via JNG of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
2 Linux kernel: buffer overflow via ext4_iget_extra_inode
An attacker can generate a buffer overflow via ext4_iget_extra_inode() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 Linux kernel: buffer overflow via ext4_xattr_set_entry
An attacker can generate a buffer overflow via ext4_xattr_set_entry() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
3 NetBSD: bypassing NPF rule via ICMP
An attacker can trigger an use after free in NPF by sending an IPv6 packet to NetBSD, in order to bypass rules or trigger a denial of service...
4 NetBSD: bypassing NPF rule via IPv6
An attacker can generate an integer overflow in NPF by sending an IPv6 packet to NetBSD, in order to bypass L4 rules...
2 Joomla Booking Calendar: vulnerability
A vulnerability of Joomla Booking Calendar was announced...
2 WordPress Loginizer: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Loginizer, in order to run JavaScript code in the context of the web site...
2 Drupal Zircon: vulnerability
A vulnerability of Drupal Zircon was announced...
2 Drupal Education: vulnerability
A vulnerability of Drupal Education was announced...
2 Drupal TB Sirate: vulnerability
A vulnerability of Drupal TB Sirate was announced...
2 Drupal Hotel: vulnerability
A vulnerability of Drupal Hotel was announced...
2 Drupal iShopping: vulnerability
A vulnerability of Drupal iShopping was announced...
2 Drupal Corporate Site: vulnerability
A vulnerability of Drupal Corporate Site was announced...
2 Drupal TB Nucleus: vulnerability
A vulnerability of Drupal TB Nucleus was announced...
2 Drupal SimpleCrop: vulnerability
A vulnerability of Drupal SimpleCrop was announced...
2 Drupal Baidu Analytics: vulnerability
A vulnerability of Drupal Baidu Analytics was announced...
2 Drupal Protected Pages: vulnerability
A vulnerability of Drupal Protected Pages was announced...
2 ImageMagick: out-of-bounds memory reading via ReadSUNImage
An attacker can force a read at an invalid address via ReadSUNImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
2 ImageMagick: infinite loop via ReadTXTImage
An attacker can generate an infinite loop via ReadTXTImage() of ImageMagick, in order to trigger a denial of service...
2 ImageMagick: infinite loop via ReadMIFFImage
An attacker can generate an infinite loop via ReadMIFFImage() of ImageMagick, in order to trigger a denial of service...
2 ICU: buffer overflow via ucnv_UTF8FromUTF8
An attacker can generate a buffer overflow via ucnv_UTF8FromUTF8() of ICU, in order to trigger a denial of service, and possibly to run code...
3 PowerDNS Authoritative: buffer overflow via dnsreplay -ecs-stamp
An attacker can generate a buffer overflow via "dnsreplay -ecs-stamp" of PowerDNS Authoritative, in order to trigger a denial of service, and possibly to run code...
3 Synology DiskStation Manager: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology DiskStation Manager...
1 Node.js hekto: open redirect
An attacker can deceive the user of Node.js hekto, in order to redirect him to a malicious site...
2 Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
2 IBM DB2: buffer overflow via db2convert
An attacker can generate a buffer overflow via db2convert of IBM DB2, in order to trigger a denial of service, and possibly to run code...
2 IBM DB2: privilege escalation via File Overwrite
An attacker can bypass restrictions via File Overwrite of IBM DB2, in order to escalate his privileges...
2 IBM DB2: buffer overflow
An attacker can generate a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code...
2 IBM DB2: buffer overflow via db2licm
An attacker can generate a buffer overflow via db2licm of IBM DB2, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 822 823 824 825 826 827 828 829 831 833 834 835 836 837 838 839 840 841 861 881 901 921 941 961 981 996