The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
LibTIFF: buffer overflow via t2p_write_pdf
An attacker can generate a buffer overflow via t2p_write_pdf() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
WordPress Wp Insert: file upload
An attacker can upload a malicious file on WordPress Wp Insert, in order for example to upload a Trojan...
Zchunk: memory corruption
An attacker can generate a memory corruption of Zchunk, in order to trigger a denial of service, and possibly to run code...
Ghostscript: memory corruption via Error Exception Table
An attacker can generate a memory corruption via Error Exception Table of Ghostscript, in order to trigger a denial of service, and possibly to run code...
Mosquitto: memory leak via CONNECT Packets
An attacker can create a memory leak via CONNECT Packets of Mosquitto, in order to trigger a denial of service...
Mosquitto: denial of service via Invalid UTF-8
An attacker can generate a fatal error via Invalid UTF-8 of Mosquitto, in order to trigger a denial of service...
WordPress Breadcrumb NavXT: information disclosure via Username Disclosure
An attacker can bypass access restrictions to data via Username Disclosure of WordPress Breadcrumb NavXT, in order to obtain sensitive information...
FreeBSD: denial of service via IPv6 listen
An attacker can generate a fatal error via IPv6 listen() of FreeBSD, in order to trigger a denial of service...
FreeBSD: NULL pointer dereference via freebsd4_getfsstat
An attacker can force a NULL pointer to be dereferenced via freebsd4_getfsstat() of FreeBSD, in order to trigger a denial of service...
FreeBSD: information disclosure via getcontext/swapcontext
A local attacker can read a memory fragment via getcontext/swapcontext of FreeBSD, in order to obtain sensitive information...
NoScript: code execution via text/html/json Content-Type
An attacker can use a vulnerability via "text/html;/json" Content-Type of NoScript, in order to run code...
LibYaml-C++: buffer overflow via HandleNode
An attacker can generate a buffer overflow via HandleNode() of LibYaml-C++, in order to trigger a denial of service, and possibly to run code...
Python: denial of service via XML Hash Collisions
An attacker can generate a fatal error via XML Hash Collisions of Python, in order to trigger a denial of service...
SUSE LE Subscription Management Tool: three vulnerabilities
An attacker can use several vulnerabilities of SUSE LE Subscription Management Tool...
IBM Spectrum Protect: denial of service
An attacker can generate a fatal error of IBM Spectrum Protect, in order to trigger a denial of service...
Udisks: information disclosure via udisks_log
An attacker can bypass access restrictions to data via udisks_log() of Udisks, in order to obtain sensitive information...
Moodle: code execution via Ddwtos XML Import
An attacker can use a vulnerability via Ddwtos XML Import of Moodle, in order to run code...
Drupal Commerce Klarna Checkout: privilege escalation via Payment Bypass
An attacker can bypass restrictions via Payment Bypass of Drupal Commerce Klarna Checkout, in order to escalate his privileges...
Drupal Taxonomy File Tree: file reading
A local attacker can read a file of Drupal Taxonomy File Tree, in order to obtain sensitive information...
Linux kernel: NULL pointer dereference via hfsplus_lookup
An attacker can force a NULL pointer to be dereferenced via hfsplus_lookup() of the Linux kernel, in order to trigger a denial of service...
Cisco IOS XE: use after free via Web UI
An attacker can force the usage of a freed memory area via Web UI of Cisco IOS XE, in order to trigger a denial of service, and possibly to run code...
Cisco IOS XE: buffer overflow via HTTP
An attacker can generate a buffer overflow via HTTP of Cisco IOS XE, in order to trigger a denial of service, and possibly to run code...
Cisco IOS, IOS XE: denial of service via VLAN Trunking Protocol
An attacker can generate a fatal error via VLAN Trunking Protocol of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via TACACS
An attacker can generate a fatal error via TACACS of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via SM-1T3/E3
An attacker can generate a fatal error via SM-1T3/E3 of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS XE: denial of service via NAT SIP ALG
An attacker can generate a fatal error via NAT SIP ALG of Cisco IOS XE, in order to trigger a denial of service...
Cisco IOS XE: privilege escalation via Shell Access Request
An attacker can bypass restrictions via Shell Access Request of Cisco IOS XE, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 859 860 861 862 863 864 865 866 867 869 871 872 873 874 875 876 877 878 879 881 901 921 941 961 981 1001 1020