The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
libpng: memory leak via png_create_info_struct
An attacker can create a memory leak via png_create_info_struct() of libpng, in order to trigger a denial of service...
LibTIFF: memory leak via TIFFFdOpen
An attacker can create a memory leak via TIFFFdOpen() of LibTIFF, in order to trigger a denial of service...
Docker Engine/Moby: denial of service via cpuset-cpus/cpuset-mems
An attacker can trigger a fatal error via cpuset-cpus/cpuset-mems of Docker Engine/Moby, in order to trigger a denial of service...
Brocade Network Advisor: privilege escalation via User Database Export
An attacker can bypass restrictions via User Database Export of Brocade Network Advisor, in order to escalate his privileges...
Brocade Network Advisor: code execution via Webconsole
An attacker can use a vulnerability via Webconsole of Brocade Network Advisor, in order to run code...
Brocade Network Advisor: privilege escalation via Hard-coded Credentials
An attacker can bypass restrictions via Hard-coded Credentials of Brocade Network Advisor, in order to escalate his privileges...
etcd: privilege escalation via AuthInfoFromTLS gRPC-gateway
An attacker can bypass restrictions via AuthInfoFromTLS() of etcd, in order to escalate his privileges...
OpenSSH scp, PuTTY PSCP: spoofing via Scp Client ANSI Codes stderr File Hidding
An attacker can spoof displayed filenames on the scp client of OpenSSH and PuTTY, in order to deceive the victim...
OpenSSH scp, PuTTY PSCP: spoofing via Scp Client ANSI Codes File Hidding
An attacker can spoof displayed filenames on the scp client of OpenSSH and PuTTY, in order to deceive the victim...
aria2: information disclosure via aria2c log
An attacker can bypass access restrictions to data via aria2c log of aria2, in order to obtain sensitive information...
GraphicsMagick: infinite loop via coders/bmp.c
An attacker can trigger an infinite loop via coders/bmp.c of GraphicsMagick, in order to trigger a denial of service...
polkit: privilege escalation via Start Time Reuse
An attacker can bypass restrictions via Start Time Reuse of polkit, in order to escalate his privileges...
systemd: out-of-bounds memory reading via Colon Log Messages
An attacker can force a read at an invalid address via Colon Log Messages of systemd, in order to trigger a denial of service, or to obtain sensitive information...
SQLite: buffer overflow via sqlite3_value_text
An attacker can trigger a buffer overflow via sqlite3_value_text() of SQLite, in order to trigger a denial of service, and possibly to run code...
SQLite: memory corruption via Table Objects
An attacker can trigger a memory corruption via Table Objects of SQLite, in order to trigger a denial of service, and possibly to run code...
SQLite: use after free via Query Optimizer
An attacker can force the usage of a freed memory area via Query Optimizer of SQLite, in order to trigger a denial of service, and possibly to run code...
Irssi: use after free via Scroll Buffer Hidden Lines
An attacker can force the usage of a freed memory area via Scroll Buffer Hidden Lines of Irssi, in order to trigger a denial of service, and possibly to run code...
Node.js rrgod: code execution via Malicious Package
An attacker can use a vulnerability via Malicious Package of Node.js rrgod, in order to run code...
Node.js commander-js: code execution via Malicious Package
An attacker can use a vulnerability via Malicious Package of Node.js commander-js, in order to run code...
Linux kernel: information disclosure via L2CAP_PARSE_CONF_RSP
A local attacker can read a memory fragment via L2CAP_PARSE_CONF_RSP of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via L2CAP_GET_CONF_OPT
A local attacker can read a memory fragment via L2CAP_GET_CONF_OPT of the Linux kernel, in order to obtain sensitive information...
FortiClientWindows: NULL pointer dereference via NDIS Miniport drivers
An attacker can force a NULL pointer to be dereferenced via NDIS Miniport drivers of FortiClientWindows, in order to trigger a denial of service...
FortiOS: memory corruption via SSH Username
An attacker can trigger a memory corruption via SSH Username of FortiOS, in order to trigger a denial of service, and possibly to run code...
OpenSSH, WinSCP: file overwrite via Scp Client Object Name Not Validated
An attacker can send an unexpected object to the scp client of OpeSSH/WinSCP, in order to overwrite files in the current directory of the scp client...
OpenSSH: privilege escalation via Scp Client Empty Dirname Permission Change
An attacker can bypass restrictions via Scp Client Empty Dirname Permission Change of OpenSSH, in order to escalate his privileges...
WebKitGTK+: memory corruption
An attacker can trigger a memory corruption of WebKitGTK+, in order to trigger a denial of service, and possibly to run code...
Exiv2: denial of service via CiffDirectory-readDirectory
An attacker can trigger a fatal error via CiffDirectory::readDirectory() of Exiv2, in order to trigger a denial of service...
LibVNC: use after free via File Transfer Extension
An attacker can force the usage of a freed memory area via File Transfer Extension of LibVNC, in order to trigger a denial of service, and possibly to run code...
tmpreaper: privilege escalation via Race Condition
An attacker can bypass restrictions via Race Condition of tmpreaper, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 889 890 891 892 893 894 895 896 897 899 901 902 903 904 905 906 907 908 909 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127