The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
shadow: information disclosure via Intermediate 0777 Directories
An attacker can bypass access restrictions to data via Intermediate 0777 Directories of shadow, in order to obtain sensitive information...
GraphicsMagick: memory leak via formatIPTCfromBuffer
An attacker can create a memory leak via formatIPTCfromBuffer() of GraphicsMagick, in order to trigger a denial of service...
GraphicsMagick: NULL pointer dereference via ReadOneJNGImage
An attacker can force a NULL pointer to be dereferenced via ReadOneJNGImage() of GraphicsMagick, in order to trigger a denial of service...
Joomla Forms by Balbooa: information disclosure
An attacker can bypass access restrictions to data of Joomla Forms by Balbooa, in order to obtain sensitive information...
GnuTLS: three vulnerabilities
An attacker can use several vulnerabilities of GnuTLS...
Jhead: denial of service via ProcessGpsInfo
An attacker can generate a fatal error via ProcessGpsInfo of Jhead, in order to trigger a denial of service...
strongSwan: information disclosure via IKE/IPsec RSA Signatures
An attacker can bypass access restrictions to data via IKE/IPsec RSA Signatures of strongSwan, in order to obtain sensitive information...
Linux kernel: file reading via OverlayFS
A local attacker can read a file via OverlayFS of the Linux kernel, in order to obtain sensitive information...
HAProxy: integer overflow via HTTP/2 HPACK decoder
An attacker can generate an integer overflow via HTTP/2 HPACK decoder of HAProxy, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via chap_server_compute_md5
An attacker can generate a buffer overflow via chap_server_compute_md5() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
IBM Spectrum Protect: information disclosure via Triple DES
An attacker can bypass access restrictions to data via Triple DES of IBM Spectrum Protect, in order to obtain sensitive information...
IBM Spectrum Protect: information disclosure via Legacy SSL/TLS Protocols
An attacker can bypass access restrictions to data via Legacy SSL/TLS Protocols of IBM Spectrum Protect, in order to obtain sensitive information...
WebSphere AS Liberty: information disclosure via Unencrypted ORB
An attacker can bypass access restrictions to data via Unencrypted ORB of WebSphere AS Liberty, in order to obtain sensitive information...
Nemo Extensions: privilege escalation via SambaShare
An attacker can bypass restrictions via SambaShare of Nemo Extensions, in order to escalate his privileges...
Open Build Service: denial of service via Deleting Directories
An attacker can generate a fatal error via Deleting Directories of Open Build Service, in order to trigger a denial of service...
Firefox, Thunderbird: denial of service via TransportSecurityInfo
An attacker can generate a fatal error via TransportSecurityInfo of Firefox/Thunderbird, in order to trigger a denial of service...
OpenAFS: three vulnerabilities
An attacker can use several vulnerabilities of OpenAFS...
MediaWiki: three vulnerabilities
An attacker can use several vulnerabilities of MediaWiki...
WebRTC.org: out-of-bounds memory reading via FEC
An attacker can force a read at an invalid address via FEC of WebRTC.org, in order to trigger a denial of service, or to obtain sensitive information...
WebRTC.org: use after free via VP9
An attacker can force the usage of a freed memory area via VP9 of WebRTC.org, in order to trigger a denial of service, and possibly to run code...
TeX Live: buffer overflow via texlive-bin
An attacker can generate a buffer overflow via texlive-bin of TeX Live, in order to trigger a denial of service, and possibly to run code...
OTRS Help Desk: denial of service via Files Deletion
An attacker can generate a fatal error via Files Deletion of OTRS Help Desk, in order to trigger a denial of service...
Liblouis: buffer overflow via parseChars
An attacker can generate a buffer overflow via parseChars() of Liblouis, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: NULL pointer dereference via GetMagickProperty
An attacker can force a NULL pointer to be dereferenced via GetMagickProperty() of GraphicsMagick, in order to trigger a denial of service...
OTRS Help Desk: denial of service via Files Deletion
An attacker can generate a fatal error via Files Deletion of OTRS Help Desk, in order to trigger a denial of service...
Gitolite: privilege escalation via Git Repository Access
An attacker can bypass restrictions via Git Repository Access of Gitolite, in order to escalate his privileges...
Joomla JCK Editor: SQL injection
An attacker can use a SQL injection of Joomla JCK Editor, in order to read or alter data...
RSA Authentication Manager: three vulnerabilities
An attacker can use several vulnerabilities of RSA Authentication Manager...
WordPress Localize My Post: directory traversal
An attacker can traverse directories of WordPress Localize My Post, in order to read a file outside the service root path...
WordPress Wechat Broadcast: directory traversal
An attacker can traverse directories of WordPress Wechat Broadcast, in order to read a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 857 858 859 860 861 862 863 864 865 867 869 870 871 872 873 874 875 876 877 881 901 921 941 961 981 1001 1020