The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Python: integer overflow via Pickle
An attacker can trigger an integer overflow via Pickle of Python, in order to trigger a denial of service, and possibly to run code...
PostGIS: denial of service via ST_AsX3D
An attacker can trigger a fatal error via ST_AsX3D() of PostGIS, in order to trigger a denial of service...
Mozilla NSS: NULL pointer dereference via CMS
An attacker can force a NULL pointer to be dereferenced via CMS of Mozilla NSS, in order to trigger a denial of service...
LibVNC: three vulnerabilities
An attacker can use several vulnerabilities of LibVNC...
Check Point Gaia: privilege escalation via Administrator Password Reset
An attacker can bypass restrictions via Administrator Password Reset of Check Point Gaia, in order to escalate his privileges...
Moodle: three vulnerabilities
An attacker can use several vulnerabilities of Moodle...
LibGD: use after free via gdImagePtr
An attacker can force the usage of a freed memory area via gdImagePtr() of LibGD, in order to trigger a denial of service, and possibly to run code...
rssh: code execution via Restriction Bypass
An attacker can use a vulnerability via Restriction Bypass of rssh, in order to run code...
Linux kernel: out-of-bounds memory reading via __remove_dirty_segment
An attacker can force a read at an invalid address via __remove_dirty_segment() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: NULL pointer dereference via fscrypt_do_page_crypto
An attacker can force a NULL pointer to be dereferenced via fscrypt_do_page_crypto() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via btrfs_root_node
An attacker can force a NULL pointer to be dereferenced via btrfs_root_node() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: buffer overflow via write_extent_buffer
An attacker can trigger a buffer overflow via write_extent_buffer() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via try_merge_free_space
An attacker can force the usage of a freed memory area via try_merge_free_space() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Node.js decompress-zip: denial of service via Zip-Slip
An attacker can trigger a fatal error via Zip-Slip of Node.js decompress-zip, in order to trigger a denial of service...
Node.js bower: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Node.js bower...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
RHEL 7: assertion error via Bind Debug Log Level
An attacker can force an assertion error via Bind Debug Log Level of RHEL 7, in order to trigger a denial of service...
systemd: memory leak via journald-server.c
An attacker can create a memory leak via journald-server.c of systemd, in order to trigger a denial of service...
PowerDNS Recursor: privilege escalation via DNSSEC Signatures Validation
An attacker can bypass restrictions via DNSSEC Signatures Validation of PowerDNS Recursor, in order to escalate his privileges...
Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
Lua: use after free via lua_upvaluejoin
An attacker can force the usage of a freed memory area via lua_upvaluejoin() of Lua, in order to trigger a denial of service, and possibly to run code...
radvd: use after free via InterfaceList
An attacker can force the usage of a freed memory area via InterfaceList of radvd, in order to trigger a denial of service, and possibly to run code...
Qt: infinite loop via QTgaFile
An attacker can trigger an infinite loop via QTgaFile of Qt, in order to trigger a denial of service...
Qt: out-of-bounds memory reading via SVG Image
An attacker can force a read at an invalid address via SVG Image of Qt, in order to trigger a denial of service, or to obtain sensitive information...
F5 BIG-IP LTM: privilege escalation via Revoked Certificate SSL Forward Proxy OCSP Stapling
An attacker can bypass restrictions via Revoked Certificate SSL Forward Proxy OCSP Stapling of F5 BIG-IP LTM, in order to escalate his privileges...
F5 BIG-IP LTM: denial of service via SSL Session ID Persistence
An attacker can trigger a fatal error via SSL Session ID Persistence of F5 BIG-IP LTM, in order to trigger a denial of service...
F5 BIG-IP APM: Cross Site Scripting via Resource Information Page
An attacker can trigger a Cross Site Scripting via Resource Information Page of F5 BIG-IP APM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: Cross Site Scripting via TMUI
An attacker can trigger a Cross Site Scripting via TMUI of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
F5 BIG-IP ASM: open redirect
An attacker can deceive the user of F5 BIG-IP ASM, in order to redirect him to a malicious site...
F5 BIG-IP: information disclosure via Client SSL Profile Plain Text Connections
An attacker can bypass access restrictions to data via Client SSL Profile Plain Text Connections of F5 BIG-IP, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 894 895 896 897 898 899 900 901 902 904 906 907 908 909 910 911 912 913 914 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127