The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
LIVE555 Streaming Media Library: use after free
An attacker can force the usage of a freed memory area of LIVE555 Streaming Media Library, in order to trigger a denial of service, and possibly to run code...
SUSE supportutils: five vulnerabilities
An attacker can use several vulnerabilities of SUSE supportutils...
Simple DirectMedia Layer: multiple vulnerabilities
An attacker can use several vulnerabilities of SDL...
Joomla Edocman: SQL injection
An attacker can use a SQL injection of Joomla Edocman, in order to read or alter data...
Linux kernel: infinite loop via update_blocked_averages
An attacker can trigger an infinite loop via update_blocked_averages() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: use after free via Service Ipmievd Restart Loop
An attacker can force the usage of a freed memory area via Service Ipmievd Restart Loop of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
file: denial of service via do_core_note
An attacker can trigger a fatal error via do_core_note() of file, in order to trigger a denial of service...
file: out-of-bounds memory reading via do_core_note
An attacker can force a read at an invalid address via do_core_note() of file, in order to trigger a denial of service, or to obtain sensitive information...
Koji: SQL injection
An attacker can use a SQL injection of Koji, in order to read or alter data...
Poppler: denial of service via extractPDFSubtype
An attacker can trigger a fatal error via extractPDFSubtype of Poppler, in order to trigger a denial of service...
Pagure: information disclosure via API keys
An attacker can bypass access restrictions to data via API keys of Pagure, in order to obtain sensitive information...
SoX: buffer overflow via start_read AdpcmReadBlock
An attacker can trigger a buffer overflow via start_read() or AdpcmReadBlock() of SoX, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory leak via kernel_read_file
An attacker can create a memory leak via kernel_read_file() of the Linux kernel, in order to trigger a denial of service...
ISC BIND: information disclosure via DLZ Zone Transfer
An attacker can bypass access restrictions to data via DLZ Zone Transfer of ISC BIND, in order to obtain sensitive information...
ISC BIND: assertion error via Managed-keys Trust Anchor Rolls Over
An attacker can force an assertion error via Managed-keys Trust Anchor Rolls Over of ISC BIND, in order to trigger a denial of service...
ISC BIND: memory leak via EDNS Options
An attacker can create a memory leak via EDNS Options of ISC BIND, in order to trigger a denial of service...
Adobe Acrobat/Reader: information disclosure
An attacker can bypass access restrictions to data of Adobe Acrobat/Reader, in order to obtain sensitive information...
Linux kernel: use after free via sctp_sendmsg
An attacker can force the usage of a freed memory area via sctp_sendmsg() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
pfSense HAProxy: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of pfSense HAProxy, in order to run JavaScript code in the context of the web site...
Drupal Core: code execution via Web Services Module
An attacker can use a vulnerability via Web Services Module of Drupal Core, in order to run code...
Cisco Prime Infrastructure: Man-in-the-Middle via SSL Certificate Not Validated
An attacker can act as a Man-in-the-Middle via SSL Certificate Not Validated on Cisco Prime Infrastructure, in order to read or write data in the session...
Cisco Prime Collaboration Assurance: privilege escalation via Authentication Bypass
An attacker can bypass restrictions via Authentication Bypass of Cisco Prime Collaboration Assurance, in order to escalate his privileges...
Cisco IP Phone SPAx: privilege escalation via Certificate Validation
An attacker can bypass restrictions via Certificate Validation of Cisco IP Phone SPAx, in order to escalate his privileges...
Cisco IP Phone 7800/8800: denial of service via CDP/LLDP
An attacker can trigger a fatal error via CDP/LLDP of Cisco IP Phone 7800/8800, in order to trigger a denial of service...
QEMU: information disclosure via PPC64 sPAPR host-serial/model
An attacker, inside a guest system, can bypass access restrictions to data via PPC64 sPAPR host-serial/model of QEMU, in order to obtain sensitive information on the host system...
Apache Kafka: denial of service via Metadata Spamming Requests
An attacker can trigger a fatal error via Metadata Spamming Requests of Apache Kafka, in order to trigger a denial of service...
GDM: privilege escalation
An attacker can bypass restrictions of GDM, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 900 901 902 903 904 905 906 907 908 910 912 913 914 915 916 917 918 919 920 921 941 961 981 1001 1021 1041 1061 1081 1101 1114