The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
libbfd: denial of service via Symbol Count
An attacker can generate a fatal error via Symbol Count of libbfd, in order to trigger a denial of service...
libbfd: out-of-bounds memory reading via pe_bfd_read_buildid
An attacker can force a read at an invalid address via pe_bfd_read_buildid() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via coff_slurp_line_table
An attacker can force a read at an invalid address via coff_slurp_line_table() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via DW_FORM_ref_addr
An attacker can force a read at an invalid address via DW_FORM_ref_addr of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: NULL pointer dereference via debug_line
An attacker can force a NULL pointer to be dereferenced via debug_line of libbfd, in order to trigger a denial of service...
readelf: denial of service via ELF
An attacker can generate a fatal error via ELF of readelf, in order to trigger a denial of service...
libssh: privilege escalation via Server Mode
An attacker can bypass restrictions via Server Mode of libssh, in order to escalate his privileges...
Oracle VM VirtualBox: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Oracle Java: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Apache Struts 1.3: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Apache Struts 1.3, in order to run JavaScript code in the context of the web site...
Oracle Outside In Technology: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Oracle Fusion Middleware: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Oracle Communications: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Oracle Database: vulnerabilities of October 2018
Several vulnerabilities were announced in Oracle products...
Python Requests: information disclosure via HTTP Authorization Header
An attacker can bypass access restrictions to data via HTTP Authorization Header of Python Requests, in order to obtain sensitive information...
libtirpc: infinite loop
An attacker can generate an infinite loop of libtirpc, in order to trigger a denial of service...
lighttpd: two vulnerabilities
An attacker can use several vulnerabilities of lighttpd...
Joomla CW Article Attachments: SQL injection
An attacker can use a SQL injection of Joomla CW Article Attachments, in order to read or alter data...
Joomla Kunena: two vulnerabilities
An attacker can use several vulnerabilities of Joomla Kunena...
WebSphere AS: Cross Site Scripting via Admin Console
An attacker can trigger a Cross Site Scripting via Admin Console of WebSphere AS, in order to run JavaScript code in the context of the web site...
WebSphere AS: directory traversal via Admin Console
An attacker can traverse directories via Admin Console of WebSphere AS, in order to read a file outside the service root path...
OpenJPEG: integer overflow via opj_j2k_setup_encoder
An attacker can generate an integer overflow via opj_j2k_setup_encoder() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
MoinMoin: Cross Site Scripting via GUI editor
An attacker can trigger a Cross Site Scripting via GUI editor of MoinMoin, in order to run JavaScript code in the context of the web site...
Palo Alto PAN-OS: Cross Site Scripting via GlobalProtect Portal Login
An attacker can trigger a Cross Site Scripting via GlobalProtect Portal Login of Palo Alto PAN-OS, in order to run JavaScript code in the context of the web site...
Wireshark: four vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
TeX Live: file corruption via mktexlsr
A local attacker can create a symbolic link used by mktexlsr, in order to alter the pointed file, with privileges of TeX Live...
SpamAssassin: code execution via Meta Rule Syntax
An attacker can use a vulnerability via Meta Rule Syntax of SpamAssassin, in order to run code...
SpamAssassin: denial of service via Unclosed Tags
An attacker can generate a fatal error via Unclosed Tags of SpamAssassin, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 864 865 866 867 868 869 870 871 872 874 876 877 878 879 880 881 882 883 884 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103