The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 libarchive: infinite loop via _warc_read
An attacker can trigger an infinite loop via _warc_read() of libarchive, in order to trigger a denial of service...
2 Ghostscript: infinite loop via PDF
An attacker can trigger an infinite loop via PDF of Ghostscript, in order to trigger a denial of service...
3 Synology DSM: code execution
An attacker can use a vulnerability of Synology DSM, in order to run code...
2 Pulse Secure Virtual Traffic Manager: information disclosure via Historical Activity
An attacker can bypass access restrictions to data via Historical Activity of Pulse Secure Virtual Traffic Manager, in order to obtain sensitive information...
2 Pulse Secure Virtual Traffic Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Pulse Secure Virtual Traffic Manager, in order to run JavaScript code in the context of the web site...
2 Pulse Connect Secure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Pulse Connect Secure, in order to run JavaScript code in the context of the web site...
2 Trend Micro OfficeScan XG: privilege escalation via Weak File Permissions
An attacker can bypass restrictions via Weak File Permissions of Trend Micro OfficeScan XG, in order to escalate his privileges...
2 WordPress Master Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Master Slider, in order to run JavaScript code in the context of the web site...
2 GraphicsMagick: assertion error via ReadDIBImage
An attacker can force an assertion error via ReadDIBImage() of GraphicsMagick, in order to trigger a denial of service...
2 GraphicsMagick: out-of-bounds memory reading via ReadBMPImage
An attacker can force a read at an invalid address via ReadBMPImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
3 GraphicsMagick: buffer overflow via WriteTGAImage
An attacker can trigger a buffer overflow via WriteTGAImage() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
2 Windows: privilege escalation via MsiAdvertiseProduct
An attacker can bypass restrictions via MsiAdvertiseProduct of Windows, in order to escalate his privileges...
2 FortiClient: privilege escalation via Windows Vulnerability Scan
An attacker can bypass restrictions via Windows Vulnerability Scan of FortiClient, in order to escalate his privileges...
2 Enigmail: information disclosure via Web Key Discovery
An attacker can bypass access restrictions to data via Web Key Discovery of Enigmail, in order to obtain sensitive information...
2 Ruby Sanitize: Cross Site Scripting via HTML Fragment Injection
An attacker can trigger a Cross Site Scripting via HTML Fragment Injection of Ruby Sanitize, in order to run JavaScript code in the context of the web site...
2 Juniper Secure Access SSL VPN: privilege escalation via update.cgi
An attacker can bypass restrictions via update.cgi of Juniper Secure Access SSL VPN, in order to escalate his privileges...
3 syslog-ng: use after free via affile_dw_reap
An attacker can force the usage of a freed memory area via affile_dw_reap() of syslog-ng, in order to trigger a denial of service, and possibly to run code...
2 OpenBSD: buffer overflow via setsockopt
An attacker can trigger a buffer overflow via setsockopt() of OpenBSD, in order to trigger a denial of service, and possibly to run code...
2 SUSE: information disclosure via YaST2 RMT Command Line Password
An attacker can bypass access restrictions to data via YaST2 RMT Command Line Password of SUSE, in order to obtain sensitive information...
2 Tryton: Man-in-the-Middle via Bus Connection
An attacker can act as a Man-in-the-Middle via Bus Connection on Tryton, in order to read or write data in the session...
2 MIT krb5: assertion error via Old Encryption S4U2Self Request
An attacker can force an assertion error via Old Encryption S4U2Self Request of MIT krb5, in order to trigger a denial of service...
2 PoDoFo: NULL pointer dereference via PdfTranslator-setTarget
An attacker can force a NULL pointer to be dereferenced via PdfTranslator::setTarget() of PoDoFo, in order to trigger a denial of service...
2 PoDoFo: denial of service via PdfVecObjects-Reserve
An attacker can trigger a fatal error via PdfVecObjects::Reserve() of PoDoFo, in order to trigger a denial of service...
2 PoDoFo: information disclosure via PdfEncoding-ParseToUnicode
An attacker can bypass access restrictions to data via PdfEncoding::ParseToUnicode() of PoDoFo, in order to obtain sensitive information...
2 PoDoFo: out-of-bounds memory reading via PdfVariant-DelayedLoad
An attacker can force a read at an invalid address via PdfVariant::DelayedLoad() of PoDoFo, in order to trigger a denial of service, or to obtain sensitive information...
2 PoDoFo: NULL pointer dereference via PdfDocument-Append
An attacker can force a NULL pointer to be dereferenced via PdfDocument::Append() of PoDoFo, in order to trigger a denial of service...
2 PoDoFo: NULL pointer dereference via PdfPage-GetPageNumber
An attacker can force a NULL pointer to be dereferenced via PdfPage::GetPageNumber() of PoDoFo, in order to trigger a denial of service...
2 PoDoFo: infinite loop via PdfPagesTree-GetPageNode
An attacker can trigger an infinite loop via PdfPagesTree::GetPageNode() of PoDoFo, in order to trigger a denial of service...
2 PoDoFo: denial of service via PdfVecObjects-Reserve
An attacker can trigger a fatal error via PdfVecObjects::Reserve() of PoDoFo, in order to trigger a denial of service...
2 Mosquitto: privilege escalation via ACL Bypass
An attacker can bypass restrictions via ACL Bypass of Mosquitto, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 884 885 886 887 888 889 890 891 892 894 896 897 898 899 900 901 902 903 904 921 941 961 981 996