The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
HylaFAX: memory corruption via JPEG Fax Call
An attacker can generate a memory corruption via JPEG Fax Call of HylaFAX, in order to trigger a denial of service, and possibly to run code...
Asterisk: denial of service via res_http_websocket.so
An attacker can generate a fatal error via res_http_websocket.so of Asterisk, in order to trigger a denial of service...
Sympa: open redirect via wwsympa.fcgi
An attacker can deceive the user via wwsympa.fcgi of Sympa, in order to redirect him to a malicious site...
OpenBSD: vulnerability via AMD CPU LDTR
A vulnerability via AMD CPU LDTR of OpenBSD was announced...
WebKitGTK+: buffer overflow via get_simple_globs
An attacker can generate a buffer overflow via get_simple_globs() of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...
ISC BIND: privilege escalation via krb5-subdomain/ms-subdomain Configuration Bypass
An attacker can bypass restrictions via krb5-subdomain/ms-subdomain Configuration Bypass of ISC BIND, in order to escalate his privileges...
Drupal Renderkit: privilege escalation
An attacker can bypass restrictions of Drupal Renderkit, in order to escalate his privileges...
Suricata: privilege escalation via ICMPv4 Error
An attacker can bypass restrictions via ICMPv4 Error of Suricata, in order to escalate his privileges...
Cisco IOS XE: code execution via Default Username/Password
An attacker can use a vulnerability via Default Username/Password of Cisco IOS XE, in order to run code...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
ArcSight Management Center: multiple vulnerabilities
An attacker can use several vulnerabilities of ArcSight Management Center...
Codra Panorama: buffer overflow via OPC UA
An attacker can generate a buffer overflow via OPC UA of Codra Panorama, in order to trigger a denial of service, and possibly to run code...
Joomla Realpin: SQL injection
An attacker can use a SQL injection of Joomla Realpin, in order to read or alter data...
Elasticsearch: information disclosure via _cluster/settings API
An attacker can bypass access restrictions to data via _cluster/settings API of Elasticsearch, in order to obtain sensitive information...
BlackBerry Enterprise Mobility Server: directory traversal via Connect Service
An attacker can traverse directories via Connect Service of BlackBerry Enterprise Mobility Server, in order to read a file outside the service root path...
GNOME GLib: out-of-bounds memory reading via g_markup_parse_context_parse
An attacker can force a read at an invalid address via g_markup_parse_context_parse() of GNOME GLib, in order to trigger a denial of service, or to obtain sensitive information...
GNOME GLib: NULL pointer dereference via g_markup_parse_context_end_parse
An attacker can force a NULL pointer to be dereferenced via g_markup_parse_context_end_parse() of GNOME GLib, in order to trigger a denial of service...
IBM DB2: privilege escalation via Administrative Task Scheduler
An attacker can bypass restrictions via Administrative Task Scheduler of IBM DB2, in order to escalate his privileges...
IBM DB2: file reading via db2cacpy
A local attacker can read a file via db2cacpy of IBM DB2, in order to obtain sensitive information...
IBM DB2: buffer overflow via db2licm
An attacker can generate a buffer overflow via db2licm of IBM DB2, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP ASM: privilege escalation via Ignored Attack Signatures
An attacker can bypass restrictions via Ignored Attack Signatures of F5 BIG-IP ASM, in order to escalate his privileges...
Linux kernel: information disclosure via vmacache_flush_all
A local attacker can read a memory fragment via vmacache_flush_all() of the Linux kernel, in order to obtain sensitive information...
Magento Commerce, Open Source: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento Commerce/OpenSource...
TCPDF: code execution
An attacker can use a vulnerability of TCPDF, in order to run code...
Google Chrome: vulnerability
A vulnerability of Google Chrome was announced...
WordPress Quizlord: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Quizlord, in order to run JavaScript code in the context of the web site...
WordPress Jibu Pro: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Jibu Pro, in order to run JavaScript code in the context of the web site...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
GraphicsMagick: denial of service via ReadBMPImage/ReadDIBImage
An attacker can generate a fatal error via ReadBMPImage/ReadDIBImage() of GraphicsMagick, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 856 857 858 859 860 861 862 863 864 866 868 869 870 871 872 873 874 875 876 881 901 921 941 961 981 1001 1013