The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Kamailio: memory corruption via crcitt_string_array
An attacker can generate a memory corruption via crcitt_string_array() of Kamailio, in order to trigger a denial of service, and possibly to run code...
mgetty: code execution via faxrunq/faxq
An attacker can use a vulnerability via faxrunq/faxq of mgetty, in order to run code...
Windows: vulnerabilities of September 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of September 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Lync for Mac 2011: privilege escalation
An attacker can bypass restrictions of Microsoft Lync for Mac 2011, in order to escalate his privileges...
Microsoft .NET Framework: code execution
An attacker can use a vulnerability of Microsoft .NET Framework, in order to run code...
Microsoft IE/Edge: vulnerabilities of September 2018
An attacker can use several vulnerabilities of Microsoft products...
GlusterFS: multiple vulnerabilities
An attacker can use several vulnerabilities of GlusterFS...
Okular: directory traversal
An attacker can traverse directories of Okular, in order to read a file outside the service root path...
Zsh: code execution via Shebang Line Substring
An attacker can use a vulnerability via Shebang Line Substring of Zsh, in order to run code...
Zsh: code execution via Shebang Line Special Char
An attacker can use a vulnerability via Shebang Line Special Char of Zsh, in order to run code...
Adobe Flash Player: information disclosure
An attacker can bypass access restrictions to data of Adobe Flash Player, in order to obtain sensitive information...
iniParser: buffer overflow via iniparser_load
An attacker can generate a buffer overflow via iniparser_load() of iniParser, in order to trigger a denial of service, and possibly to run code...
Godot: denial of service
An attacker can generate a fatal error of Godot, in order to trigger a denial of service...
SAP: multiples vulnerabilities of September 2018
An attacker can use several vulnerabilities of SAP products...
WPA/WPA2: information disclosure via PSK PMKID
An attacker can bypass access restrictions to data via PSK PMKID of WPA/WPA2, in order to obtain sensitive information...
Linux kernel: information disclosure via AF_VSOCK
A local attacker can read a memory fragment via AF_VSOCK of the Linux kernel, in order to obtain sensitive information...
Docker Moby: privilege escalation via System Root CA Signed Certificate
An attacker can bypass restrictions via System Root CA Signed Certificate of Docker Moby, in order to escalate his privileges...
libbson: out-of-bounds memory reading via _bson_iter_next_internal
An attacker can force a read at an invalid address via _bson_iter_next_internal() of libbson, in order to trigger a denial of service, or to obtain sensitive information...
Apache Tika: infinite loop via ChmParser
An attacker can generate an infinite loop via ChmParser of Apache Tika, in order to trigger a denial of service...
Apache Tika: infinite loop via BPGParser
An attacker can generate an infinite loop via BPGParser of Apache Tika, in order to trigger a denial of service...
RichFaces: code execution via org.richfaces.renderkit.html.Paint2DResource$ImageData
An attacker can use a vulnerability via org.richfaces.renderkit.html.Paint2DResource$ImageData of RichFaces, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 854 855 856 857 858 859 860 861 862 864 866 867 868 869 870 871 872 873 874 881 901 921 941 961 981 1001 1020