The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FFmpeg: denial of service via movenc.c
An attacker can trigger a fatal error via movenc.c of FFmpeg, in order to trigger a denial of service...
FFmpeg: buffer overflow via ff_free_picture_tables
An attacker can trigger a buffer overflow via ff_free_picture_tables() of FFmpeg, in order to trigger a denial of service, and possibly to run code...
FFmpeg: buffer overflow via vp8_decode_mb_row_no_filter
An attacker can trigger a buffer overflow via vp8_decode_mb_row_no_filter() of FFmpeg, in order to trigger a denial of service, and possibly to run code...
Ceph: denial of service via max-keys/max-uploads/max-parts
An attacker can trigger a fatal error via max-keys/max-uploads/max-parts of Ceph, in order to trigger a denial of service...
Ceph: privilege escalation via Config Store Low Caps
An attacker can bypass restrictions via Config Store Low Caps of Ceph, in order to escalate his privileges...
Kubernetes Dashboard: privilege escalation via Service Account
An attacker can bypass restrictions via Service Account of Kubernetes Dashboard, in order to escalate his privileges...
Vtiger CRM: file upload via Logo Field
An attacker can upload a malicious file via Logo Field on Vtiger CRM, in order for example to upload a Trojan...
RSA Authentication Manager: directory traversal via Quick Setup
An attacker can traverse directories via Quick Setup of RSA Authentication Manager, in order to create a file outside the service root path...
tcpreplay: out-of-bounds memory reading via csum_replace4
An attacker can force a read at an invalid address via csum_replace4() of tcpreplay, in order to trigger a denial of service, or to obtain sensitive information...
tcpreplay: use after free via post_args
An attacker can force the usage of a freed memory area via post_args() of tcpreplay, in order to trigger a denial of service, and possibly to run code...
tcpreplay: out-of-bounds memory reading via fast_edit_packet
An attacker can force a read at an invalid address via fast_edit_packet() of tcpreplay, in order to trigger a denial of service, or to obtain sensitive information...
tcpreplay: out-of-bounds memory reading via get_next_packet
An attacker can force a read at an invalid address via get_next_packet() of tcpreplay, in order to trigger a denial of service, or to obtain sensitive information...
tcpreplay: out-of-bounds memory reading via dlt_en10mb_encode
An attacker can force a read at an invalid address via dlt_en10mb_encode() of tcpreplay, in order to trigger a denial of service, or to obtain sensitive information...
Django: information disclosure via Default 404 Page Spoofing
An attacker can bypass access restrictions to data via Default 404 Page Spoofing of Django, in order to obtain sensitive information...
Linux kernel: denial of service via can_can_gw_rcv
An attacker can trigger a fatal error via can_can_gw_rcv() of the Linux kernel, in order to trigger a denial of service...
RHEL 7 Kernel: out-of-bounds memory reading via memcpy_fromiovecend
An attacker can force a read at an invalid address via memcpy_fromiovecend() of RHEL 7 Kernel, in order to trigger a denial of service, or to obtain sensitive information...
Ansible Tower: information disclosure via AMPQ RabbitMQ Celery Workers Messaging
An attacker can bypass access restrictions to data via AMPQ RabbitMQ Celery Workers Messaging of Ansible Tower, in order to obtain sensitive information...
wget: information disclosure via set_file_metadata
An attacker can bypass access restrictions to data via set_file_metadata() of wget, in order to obtain sensitive information...
Adobe Acrobat/Reader: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
LibRaw: buffer overflow via find_green
An attacker can trigger a buffer overflow via find_green() of LibRaw, in order to trigger a denial of service, and possibly to run code...
JasPer: memory leak via base/jas_malloc.c
An attacker can create a memory leak via base/jas_malloc.c of JasPer, in order to trigger a denial of service...
JasPer: denial of service via JP2 Conversion
An attacker can trigger a fatal error via JP2 Conversion of JasPer, in order to trigger a denial of service...
JasPer: out-of-bounds memory reading via jp2_encode
An attacker can force a read at an invalid address via jp2_encode() of JasPer, in order to trigger a denial of service, or to obtain sensitive information...
JasPer: NULL pointer dereference via jp2_decode
An attacker can force a NULL pointer to be dereferenced via jp2_decode() of JasPer, in order to trigger a denial of service...
JasPer: out-of-bounds memory reading via jas_image_depalettize
An attacker can force a read at an invalid address via jas_image_depalettize() of JasPer, in order to trigger a denial of service, or to obtain sensitive information...
JasPer: buffer overflow via jas_icctxtdesc_input
An attacker can trigger a buffer overflow via jas_icctxtdesc_input() of JasPer, in order to trigger a denial of service, and possibly to run code...
JasPer: out-of-bounds memory reading via jas_image_readcmpt
An attacker can force a read at an invalid address via jas_image_readcmpt() of JasPer, in order to trigger a denial of service, or to obtain sensitive information...
JasPer: memory leak via jpc_unk_getparms
An attacker can create a memory leak via jpc_unk_getparms() of JasPer, in order to trigger a denial of service...
JasPer: NULL pointer dereference via ras_putdatastd
An attacker can force a NULL pointer to be dereferenced via ras_putdatastd() of JasPer, in order to trigger a denial of service...
libQt5: NULL pointer dereference via QGifHandler
An attacker can force a NULL pointer to be dereferenced via QGifHandler() of libQt5, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 886 887 888 889 890 891 892 893 894 896 898 899 900 901 902 903 904 905 906 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1133