The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Exiv2: out-of-bounds memory reading via Exiv2-Internal-PngChunk-keyTXTChunk
An attacker can force a read at an invalid address via Exiv2::Internal::PngChunk::keyTXTChunk() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
LibTIFF: buffer overflow via cpSeparateBufToContigBuf
An attacker can generate a buffer overflow via cpSeparateBufToContigBuf() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
tmux: NULL pointer dereference via format_cb_pane_tabs
An attacker can force a NULL pointer to be dereferenced via format_cb_pane_tabs() of tmux, in order to trigger a denial of service...
QEMU: denial of service via 9pfs Files Renaming
An attacker, inside a guest system, can generate a fatal error via 9pfs Files Renaming of QEMU, in order to trigger a denial of service on the host system...
Gnuplot: three vulnerabilities
An attacker can use several vulnerabilities of Gnuplot...
Apache XML Security for C++: denial of service via DSA Key KeyInfo Combinations
An attacker can generate a fatal error via DSA Key KeyInfo Combinations of Apache XML Security for C++, in order to trigger a denial of service...
phpBB: code execution via Phar Object Injection
An attacker can use a vulnerability via Phar Object Injection of phpBB, in order to run code...
Linux kernel: file reading via Deleted Files In Cleancache
A local attacker can read a file via Deleted Files In Cleancache of the Linux kernel, in order to obtain sensitive information...
FortiOS: information disclosure via Web Proxy Disclaimer Response
A local attacker can read a memory fragment via Web Proxy Disclaimer Response of FortiOS, in order to obtain sensitive information...
libsndfile: NULL pointer dereference via sf_write_int
An attacker can force a NULL pointer to be dereferenced via sf_write_int() of libsndfile, in order to trigger a denial of service...
PHPMailer: code execution via Object Injection
An attacker can use a vulnerability via Object Injection of PHPMailer, in order to run code...
VMware Workstation: integer overflow via Virtual Network Device
An attacker, inside a guest system, can generate an integer overflow via Virtual Network Device of VMware Workstation, in order to trigger a denial of service, and possibly to run code on the host system...
Pixman: integer overflow
An attacker can generate an integer overflow of Pixman, in order to trigger a denial of service, and possibly to run code...
PHP: code execution via imap_open Server Name
An attacker can use a vulnerability via imap_open() Server Name of PHP, in order to run code...
Python urllib3: information disclosure via Authorization Header
An attacker can bypass access restrictions to data via Authorization Header of Python urllib3, in order to obtain sensitive information...
JasPer: out-of-bounds memory reading via jas_image_ishomosamp
An attacker can force a read at an invalid address via jas_image_ishomosamp() of JasPer, in order to trigger a denial of service, or to obtain sensitive information...
JasPer: memory leak via jas_strdup
An attacker can create a memory leak via jas_strdup() of JasPer, in order to trigger a denial of service...
Joomla Kunena: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Kunena, in order to run JavaScript code in the context of the web site...
Ruby Rack: Cross Site Scripting via Rack-Request
An attacker can trigger a Cross Site Scripting via Rack::Request of Ruby Rack, in order to run JavaScript code in the context of the web site...
Linux kernel: NULL pointer dereference via vcpu_scan_ioapic
An attacker can force a NULL pointer to be dereferenced via vcpu_scan_ioapic() of the Linux kernel, in order to trigger a denial of service...
PHP: NULL pointer dereference via Unserializing COM Objects
An attacker can force a NULL pointer to be dereferenced via Unserializing COM Objects of PHP, in order to trigger a denial of service...
Ruby i18n: denial of service via Hash-slice
An attacker can generate a fatal error via Hash::slice of Ruby i18n, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 876 877 878 879 880 881 882 883 884 886 888 889 890 891 892 893 894 895 896 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103