The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Spring Framework: denial of service via Complex Range Requests
An attacker can generate a fatal error via Complex Range Requests of Spring Framework, in order to trigger a denial of service...
Synology DSM: information disclosure
An attacker can bypass access restrictions to data of Synology DSM, in order to obtain sensitive information...
VMware ESXi, Workstation: privilege escalation via SVGA Device
An attacker, inside a guest system, can bypass restrictions via SVGA Device of VMware ESXi, Workstation, in order to escalate his privileges on the host system...
GraphicsMagick: out-of-bounds memory reading via WriteWEBPImage
An attacker can force a read at an invalid address via WriteWEBPImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: out-of-bounds memory reading via ReadPALMImage
An attacker can force a read at an invalid address via ReadPALMImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: use after free via ReadOneJNGImage
An attacker can force the usage of a freed memory area via ReadOneJNGImage() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: use after free via ReadOneJNGImage
An attacker can force the usage of a freed memory area via ReadOneJNGImage() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
Apache PDFBox: infinite loop
An attacker can generate an infinite loop of Apache PDFBox, in order to trigger a denial of service...
QEMU: integer overflow via ccid_card_vscard_read
An attacker, inside a guest system, can generate an integer overflow via ccid_card_vscard_read() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
libbfd: memory corruption via _bfd_XX_bfd_copy_private_bfd_data_common
An attacker can generate a memory corruption via _bfd_XX_bfd_copy_private_bfd_data_common() of libbfd, in order to trigger a denial of service, and possibly to run code...
libbfd: NULL pointer dereference via ignore_section_sym
An attacker can force a NULL pointer to be dereferenced via ignore_section_sym() of libbfd, in order to trigger a denial of service...
libbfd: out-of-bounds memory reading via process_cu_tu_index
An attacker can force a read at an invalid address via process_cu_tu_index() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: NULL pointer dereference via concat_filename
An attacker can force a NULL pointer to be dereferenced via concat_filename() of libbfd, in order to trigger a denial of service...
libbfd: integer overflow via parse_die
An attacker can generate an integer overflow via parse_die() of libbfd, in order to trigger a denial of service, and possibly to run code...
libbfd: NULL pointer dereference via swap_std_reloc_in
An attacker can force a NULL pointer to be dereferenced via swap_std_reloc_in() of libbfd, in order to trigger a denial of service...
libbfd: integer overflow via display_debug_ranges
An attacker can generate an integer overflow via display_debug_ranges() of libbfd, in order to trigger a denial of service, and possibly to run code...
libbfd: denial of service via bfd_section_from_shdr
An attacker can generate a fatal error via bfd_section_from_shdr() of libbfd, in order to trigger a denial of service...
libbfd: denial of service via DWARF FORM Block
An attacker can generate a fatal error via DWARF FORM Block of libbfd, in order to trigger a denial of service...
libbfd: NULL pointer dereference via assign_file_positions_for_non_load_sections
An attacker can force a NULL pointer to be dereferenced via assign_file_positions_for_non_load_sections() of libbfd, in order to trigger a denial of service...
libbfd: out-of-bounds memory reading via coff_pointerize_aux
An attacker can force a read at an invalid address via coff_pointerize_aux() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via elf_parse_notes
An attacker can force a read at an invalid address via elf_parse_notes() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via bfd_get_debug_link_info_1
An attacker can force a read at an invalid address via bfd_get_debug_link_info_1() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: integer overflow via load_specific_debug_section
An attacker can generate an integer overflow via load_specific_debug_section() of libbfd, in order to trigger a denial of service, and possibly to run code...
libbfd: integer overflow via elf_object_p
An attacker can generate an integer overflow via elf_object_p() of libbfd, in order to trigger a denial of service, and possibly to run code...
libbfd: out-of-bounds memory reading via aout_get_external_symbols
An attacker can force a read at an invalid address via aout_get_external_symbols() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via display_debug_frames
An attacker can force a read at an invalid address via display_debug_frames() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via _bfd_elf_parse_gnu_properties
An attacker can force a read at an invalid address via _bfd_elf_parse_gnu_properties() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...
libbfd: out-of-bounds memory reading via print_gnu_property_note
An attacker can force a read at an invalid address via print_gnu_property_note() of libbfd, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 865 866 867 868 869 870 871 872 873 875 877 878 879 880 881 882 883 884 885 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103