The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Poppler: assertion error via Object-getString
An attacker can force an assertion error via Object::getString() of Poppler, in order to trigger a denial of service...
2 Python: NULL pointer dereference via _get_crl_dp
An attacker can force a NULL pointer to be dereferenced via _get_crl_dp() of Python, in order to trigger a denial of service...
2 Drupal Expand Collapse Formatter: vulnerability
A vulnerability of Drupal Expand Collapse Formatter was announced...
2 Drupal Anti Spam by CleanTalk: vulnerability
A vulnerability of Drupal Anti Spam by CleanTalk was announced...
2 Drupal Nodeaccess: vulnerability
A vulnerability of Drupal Nodeaccess was announced...
2 Drupal Gridstack Field: vulnerability
A vulnerability of Drupal Gridstack Field was announced...
2 Drupal Panels Breadcrumbs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Panels Breadcrumbs, in order to run JavaScript code in the context of the web site...
2 Drupal Image Annotator: vulnerability
A vulnerability of Drupal Image Annotator was announced...
2 Drupal Webform Table Element: vulnerability
A vulnerability of Drupal Webform Table Element was announced...
2 Drupal Preview Link: privilege escalation via Invalid Tokens
An attacker can bypass restrictions via Invalid Tokens of Drupal Preview Link, in order to escalate his privileges...
3 Cisco SD-WAN Solution: privilege escalation via vSmart Controller
An attacker can bypass restrictions via vSmart Controller of Cisco SD-WAN Solution, in order to escalate his privileges...
2 Cisco SD-WAN Solution: privilege escalation via User Group Configuration
An attacker can bypass restrictions via User Group Configuration of Cisco SD-WAN Solution, in order to escalate his privileges...
3 Cisco SD-WAN Solution: privilege escalation via Save File Overwrite
An attacker can bypass restrictions via Save File Overwrite of Cisco SD-WAN Solution, in order to escalate his privileges...
2 Cisco SD-WAN Solution: privilege escalation via Local CLI
An attacker can bypass restrictions via Local CLI of Cisco SD-WAN Solution, in order to escalate his privileges...
3 Cisco SD-WAN Solution: privilege escalation via vContainer
An attacker can bypass restrictions via vContainer of Cisco SD-WAN Solution, in order to escalate his privileges...
2 Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
2 QEMU: memory corruption via scsi_handle_inquiry_reply
An attacker, inside a guest system, can trigger a memory corruption via scsi_handle_inquiry_reply() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
3 Ghostscript: code execution via Pseudo Operators Subroutines
An attacker can use a vulnerability via Pseudo Operators Subroutines of Ghostscript, in order to run code...
2 Linux kernel: privilege escalation via i915_gem_execbuffer2_ioctl
An attacker can bypass restrictions via i915_gem_execbuffer2_ioctl of the Linux kernel, in order to escalate his privileges...
3 ntpsec: four vulnerabilities
An attacker can use several vulnerabilities of ntpsec...
2 WebKitGTK+: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK+...
2 libjpeg-turbo: out-of-bounds memory reading via put_pixel_rows
An attacker can force a read at an invalid address via put_pixel_rows() of libjpeg-turbo, in order to trigger a denial of service, or to obtain sensitive information...
2 libjpeg-turbo: buffer overflow via tjLoadImage
An attacker can trigger a buffer overflow via tjLoadImage() of libjpeg-turbo, in order to trigger a denial of service, and possibly to run code...
2 Matrix: vulnerability
A vulnerability of Matrix was announced...
4 Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
4 Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
3 Apache Subversion: NULL pointer dereference via mod_dav_svn
An attacker can force a NULL pointer to be dereferenced via mod_dav_svn of Apache Subversion, in order to trigger a denial of service...
3 Apache httpd: infinite loop via mod_ssl OpenSSL 1.1.1 Client Renegotiations
An attacker can trigger an infinite loop via mod_ssl OpenSSL 1.1.1 Client Renegotiations of Apache httpd, in order to trigger a denial of service...
2 Apache httpd: privilege escalation via mod_session_cookie Ignored Expiry Time
An attacker can bypass restrictions via mod_session_cookie Ignored Expiry Time of Apache httpd, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 892 893 894 895 896 897 898 899 900 902 904 905 906 907 908 909 910 911 912 921 941 961 981 994