The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress PS PHPCaptcha WP: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress PS PHPCaptcha WP, in order to run JavaScript code in the context of the web site...
FreeBSD: denial of service via LLE Table Lookup
An attacker can trigger a fatal error via LLE Table Lookup of FreeBSD, in order to trigger a denial of service...
FreeBSD: use after free via File Descriptor Reference Count Leak
An attacker can force the usage of a freed memory area via File Descriptor Reference Count Leak of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: information disclosure via SYSCALL Kernel Data Register
A local attacker can read a memory fragment via SYSCALL Kernel Data Register of FreeBSD, in order to obtain sensitive information...
libcurl: out-of-bounds memory reading via SMTP End-of-Response
An attacker can force a read at an invalid address via SMTP End-of-Response of libcurl, in order to trigger a denial of service, or to obtain sensitive information...
libcurl: buffer overflow via NTLM Type-3
An attacker can trigger a buffer overflow via NTLM Type-3 of libcurl, in order to trigger a denial of service, and possibly to run code...
libcurl: out-of-bounds memory reading via NTLM Type-2
An attacker can force a read at an invalid address via NTLM Type-2 of libcurl, in order to trigger a denial of service, or to obtain sensitive information...
Dovecot: privilege escalation via Empty Username
An attacker can bypass restrictions via Empty Username of Dovecot, in order to escalate his privileges...
uriparser: out-of-bounds memory reading via URI_FUNC
An attacker can force a read at an invalid address via URI_FUNC() of uriparser, in order to trigger a denial of service, or to obtain sensitive information...
Google Android/Pixel: multiple vulnerabilities of February 2019
An attacker can use several vulnerabilities of Google Android/Pixel...
WordPress MapSVG Lite: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress MapSVG Lite, in order to force the victim to perform operations...
libpng: use after free via png_image_free
An attacker can force the usage of a freed memory area via png_image_free() of libpng, in order to trigger a denial of service, and possibly to run code...
HPE Service Pack for ProLiant: privilege escalation
An attacker can bypass restrictions of HPE Service Pack for ProLiant, in order to escalate his privileges...
PowerDNS Recursor: privilege escalation via Lua Hooks Not Applied
An attacker can bypass restrictions via Lua Hooks Not Applied of PowerDNS Recursor, in order to escalate his privileges...
Nessus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Nessus, in order to run JavaScript code in the context of the web site...
Linux kernel: information disclosure via BPF Pointer Arithmetic
An attacker can bypass access restrictions to data via BPF Pointer Arithmetic of the Linux kernel, in order to obtain sensitive information...
GNU Binutils: two vulnerabilities
An attacker can use several vulnerabilities of GNU Binutils...
rssh: two vulnerabilities via Restriction Bypass
An attacker can use several vulnerabilities via Restriction Bypass of rssh...
LibreOffice/OpenOffice: code execution via Macro/Event Script Event-listener
An attacker can use a vulnerability via Macro/Event Script Event-listener of LibreOffice/OpenOffice, in order to run code...
Go: denial of service via P-521 P-384 Elliptic Curves
An attacker can trigger a fatal error via P-521 P-384 Elliptic Curves of Go, in order to trigger a denial of service...
AGG: denial of service via agg-cell_aa-not_equal
An attacker can trigger a fatal error via agg::cell_aa::not_equal() of AGG, in order to trigger a denial of service...
McAfee ePO Cloud: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of McAfee ePO Cloud, in order to run JavaScript code in the context of the web site...
IBM i: Cross Site Scripting via IBM Navigator
An attacker can trigger a Cross Site Scripting via IBM Navigator of IBM i, in order to run JavaScript code in the context of the web site...
WordPress Media File Manager: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Media File Manager...
Linux kernel: denial of service via change_port_settings
An attacker can trigger a fatal error via change_port_settings() of the Linux kernel, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 895 896 897 898 899 900 901 902 903 905 907 908 909 910 911 912 913 914 915 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127