The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ASA: denial of service via IPsec VPN TFC
An attacker can generate a fatal error via IPsec VPN TFC of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via Cryptographic Hardware Accelerator Driver
An attacker can generate a fatal error via Cryptographic Hardware Accelerator Driver of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: privilege escalation via ACL Per-user-override
An attacker can bypass restrictions via ACL Per-user-override of Cisco ASA, in order to escalate his privileges...
Apache Tomcat: open redirect via Directory Redirect
An attacker can deceive the user via Directory Redirect of Apache Tomcat, in order to redirect him to a malicious site...
Liblouis: out-of-bounds memory reading via matchCurrentInput
An attacker can force a read at an invalid address via matchCurrentInput() of Liblouis, in order to trigger a denial of service, or to obtain sensitive information...
WebKitGTK+: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK+...
Linux kernel: NULL pointer dereference via io_ctl_map_page
An attacker can force a NULL pointer to be dereferenced via io_ctl_map_page() of the Linux kernel, in order to trigger a denial of service...
ImageMagick: denial of service via ReadDCMImage
An attacker can generate a fatal error via ReadDCMImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory corruption via InsertRow
An attacker can generate a memory corruption via InsertRow() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
ImageMagick: memory leak via TIFFWritePhotoshopLayers
An attacker can create a memory leak via TIFFWritePhotoshopLayers() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via ReadOneJNGImage
An attacker can create a memory leak via ReadOneJNGImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via PushShortPixel
An attacker can force a read at an invalid address via PushShortPixel() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: NULL pointer dereference via CheckEventLogging
An attacker can force a NULL pointer to be dereferenced via CheckEventLogging() of ImageMagick, in order to trigger a denial of service...
Firefox: two vulnerabilities
An attacker can use several vulnerabilities of Firefox...
elfutils: out-of-bounds memory reading via dwarf_getaranges
An attacker can force a read at an invalid address via dwarf_getaranges() of elfutils, in order to trigger a denial of service, or to obtain sensitive information...
elfutils: out-of-bounds memory reading via dwarf_getabbrev.c/dwarf_hasattr.c
An attacker can force a read at an invalid address via dwarf_getabbrev.c/dwarf_hasattr.c of elfutils, in order to trigger a denial of service, or to obtain sensitive information...
elfutils: use after free via ELF Decompression
An attacker can force the usage of a freed memory area via ELF Decompression of elfutils, in order to trigger a denial of service, and possibly to run code...
Linux kernel: privilege escalation via Arm64 KVM Hypervisor
An attacker can bypass restrictions via Arm64 KVM Hypervisor of the Linux kernel, in order to escalate his privileges...
Google Android/Pixel: multiple vulnerabilities of October 2018
An attacker can use several vulnerabilities of Google Android/Pixel...
Zabbix: multiple vulnerabilities
An attacker can use several vulnerabilities of Zabbix...
WebSphere AS: Cross Site Scripting via OAuth Ear
An attacker can trigger a Cross Site Scripting via OAuth Ear of WebSphere AS, in order to run JavaScript code in the context of the web site...
WebSphere AS: Cross Site Scripting via SAML Ear
An attacker can trigger a Cross Site Scripting via SAML Ear of WebSphere AS, in order to run JavaScript code in the context of the web site...
Linux kernel: NULL pointer dereference via __del_reloc_root
An attacker can force a NULL pointer to be dereferenced via __del_reloc_root() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: buffer overflow via hid-debug.c
An attacker can generate a buffer overflow via hid-debug.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
strongSwan: memory corruption via Gmp Plugin
An attacker can generate a memory corruption via Gmp Plugin of strongSwan, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 860 861 862 863 864 865 866 867 868 870 872 873 874 875 876 877 878 879 880 881 901 921 941 961 981 1001 1011