The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 ytnef: out-of-bounds memory reading via SwapWord
An attacker can force a read at an invalid address via SwapWord() of ytnef, in order to trigger a denial of service, or to obtain sensitive information...
2 ytnef: buffer overflow via TNEFFillMapi
An attacker can generate a buffer overflow via TNEFFillMapi() of ytnef, in order to trigger a denial of service, and possibly to run code...
2 ytnef: buffer overflow via TNEFFillMapi
An attacker can generate a buffer overflow via TNEFFillMapi() of ytnef, in order to trigger a denial of service, and possibly to run code...
2 Apache XML-RPC: code execution via ex-serializable
An attacker can use a vulnerability via ex:serializable of Apache XML-RPC, in order to run code...
2 Zabbix: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Zabbix, in order to run JavaScript code in the context of the web site...
2 Synology DSM: privilege escalation via SSO Server
An attacker can bypass restrictions via SSO Server of Synology DSM, in order to escalate his privileges...
2 Synology DSM: privilege escalation via Universal Search
An attacker can bypass restrictions via Universal Search of Synology DSM, in order to escalate his privileges...
2 Synology DSM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology DSM, in order to run JavaScript code in the context of the web site...
2 F5 BIG-IP: denial of service via Behavioral DoS
An attacker can generate a fatal error via Behavioral DoS of F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: denial of service via DIAMETER
An attacker can send malicious DIAMETER packets to F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: denial of service via SSL Profiles
An attacker can generate a fatal error via SSL Profiles of F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: denial of service via Inflate Zip Bomb
An attacker can generate a fatal error via Inflate Zip Bomb of F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: privilege escalation via Configuration Utility
An attacker can bypass restrictions via Configuration Utility of F5 BIG-IP, in order to escalate his privileges...
3 F5 BIG-IP: denial of service via TLS Handshake
An attacker can generate a fatal error via TLS Handshake of F5 BIG-IP, in order to trigger a denial of service...
2 F5 BIG-IP: Cross Site Scripting via GeoIP
An attacker can trigger a Cross Site Scripting via GeoIP of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
2 F5 BIG-IP: file reading via Configuration Utility
A local attacker can read a file via Configuration Utility of F5 BIG-IP, in order to obtain sensitive information...
2 WordPress Mass Pages/Posts Creator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Mass Pages/Posts Creator, in order to run JavaScript code in the context of the web site...
2 WordPress Woocommerce Category Banner Management: privilege escalation
An attacker can bypass restrictions of WordPress Woocommerce Category Banner Management, in order to escalate his privileges...
2 WordPress Gameplan Event and Gym Fitness: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gameplan Event and Gym Fitness, in order to run JavaScript code in the context of the web site...
2 Apport: privilege escalation via Core Dumps
An attacker can bypass restrictions via Core Dumps of Apport, in order to escalate his privileges...
2 Gifsicle: use after free via read_gif
An attacker can force the usage of a freed memory area via read_gif() of Gifsicle, in order to trigger a denial of service, and possibly to run code...
1 Node.js base64url: information disclosure
A local attacker can read a memory fragment of Node.js base64url, in order to obtain sensitive information...
2 Node.js mixin-deep: vulnerability
A vulnerability of Node.js mixin-deep was announced...
2 libmikmod: buffer overflow via loaders/load_it.c
An attacker can generate a buffer overflow via loaders/load_it.c of libmikmod, in order to trigger a denial of service, and possibly to run code...
2 libmikmod: buffer overflow via loaders/load_it.c
An attacker can generate a buffer overflow via loaders/load_it.c of libmikmod, in order to trigger a denial of service, and possibly to run code...
4 Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
1 NVIDIA Graphics Drivers: denial of service via DirectX/OpenGL
An attacker can generate a fatal error via DirectX/OpenGL of NVIDIA Graphics Drivers, in order to trigger a denial of service...
1 NVIDIA Graphics Drivers: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of NVIDIA Graphics Drivers, in order to trigger a denial of service...
2 git: code execution via gitmodules
An attacker can use a vulnerability via gitmodules of git, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 823 824 825 826 827 828 829 830 831 833 835 836 837 838 839 840 841 842 843 861 881 901 921 941 961 981 996