The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP: privilege escalation via TMUI
An attacker can bypass restrictions via TMUI of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: privilege escalation via AAM dcdb_convert
An attacker can bypass restrictions via AAM dcdb_convert of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via Gzip Bomb
An attacker can trigger a fatal error via Gzip Bomb of F5 BIG-IP, in order to trigger a denial of service...
LibVNC: six vulnerabilities
An attacker can use several vulnerabilities of LibVNC...
LibVNC: buffer overflow via File Transfer Extension
An attacker can trigger a buffer overflow via File Transfer Extension of LibVNC, in order to trigger a denial of service, and possibly to run code...
LibVNC: use after free via File Transfer Extension
An attacker can force the usage of a freed memory area via File Transfer Extension of LibVNC, in order to trigger a denial of service, and possibly to run code...
GNU Libextractor: NULL pointer dereference via process_metadata
An attacker can force a NULL pointer to be dereferenced via process_metadata() of GNU Libextractor, in order to trigger a denial of service...
GNU Libextractor: out-of-bounds memory reading via history_extract
An attacker can force a read at an invalid address via history_extract() of GNU Libextractor, in order to trigger a denial of service, or to obtain sensitive information...
OpenJPEG: denial of service via pi_next_pcrl
An attacker can trigger a fatal error via pi_next_pcrl() of OpenJPEG, in order to trigger a denial of service...
OpenJPEG: infinite loop via opj_t1_encode_cblks
An attacker can trigger an infinite loop via opj_t1_encode_cblks() of OpenJPEG, in order to trigger a denial of service...
libarchive: use after free via RAR Decoder
An attacker can force the usage of a freed memory area via RAR Decoder of libarchive, in order to trigger a denial of service, and possibly to run code...
libarchive: use after free via RAR Decoder
An attacker can force the usage of a freed memory area via RAR Decoder of libarchive, in order to trigger a denial of service, and possibly to run code...
Netatalk: buffer overflow via dsi_opensess.c
An attacker can trigger a buffer overflow via dsi_opensess.c of Netatalk, in order to trigger a denial of service, and possibly to run code...
FFmpeg: memory corruption via update_dimensions
An attacker can trigger a memory corruption via update_dimensions() of FFmpeg, in order to trigger a denial of service, and possibly to run code...
FFmpeg: out-of-bounds memory reading via ff_hevc_parse_sps function
An attacker can force a read at an invalid address via ff_hevc_parse_sps function() of FFmpeg, in order to trigger a denial of service, or to obtain sensitive information...
F5 BIG-IP: denial of service via Intel SPI Flash
An attacker can generate a fatal error via Intel SPI Flash of F5 BIG-IP, in order to trigger a denial of service...
WordPress Two Factor Authentication: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Two Factor Authentication, in order to force the victim to perform operations...
Microsoft IE: memory corruption via JScript
An attacker can generate a memory corruption via JScript of Microsoft IE, in order to trigger a denial of service, and possibly to run code...
BlueZ: buffer overflow via set_ext_ctrl
An attacker can generate a buffer overflow via set_ext_ctrl() of BlueZ, in order to trigger a denial of service, and possibly to run code...
BlueZ: buffer overflow via pin_code_reply_dump
An attacker can generate a buffer overflow via pin_code_reply_dump() of BlueZ, in order to trigger a denial of service, and possibly to run code...
FreeBSD: denial of service via ZFS Vnode Deadlock
An attacker can generate a fatal error via ZFS Vnode Deadlock of FreeBSD, in order to trigger a denial of service...
FreeBSD: denial of service via Intel Skylake
An attacker can generate a fatal error via Intel Skylake of FreeBSD, in order to trigger a denial of service...
FreeBSD: denial of service via ptrace Stopped Process
An attacker can generate a fatal error via ptrace Stopped Process of FreeBSD, in order to trigger a denial of service...
FreeBSD: buffer overflow via bootpd
An attacker can generate a buffer overflow via bootpd of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Drupal JSON-API: privilege escalation
An attacker can bypass restrictions of Drupal JSON:API, in order to escalate his privileges...
Drupal E-Sign: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal E-Sign, in order to run JavaScript code in the context of the web site...
Cisco ASA: privilege escalation via Web Management Interface
An attacker can bypass restrictions via Web Management Interface of Cisco ASA, in order to escalate his privileges...
Shibboleth Service Provider: denial of service via Malformed Date/Time
An attacker can generate a fatal error via Malformed Date/Time of Shibboleth Service Provider, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 883 884 885 886 887 888 889 890 891 893 895 896 897 898 899 900 901 902 903 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1139