The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mini-XML: use after free via mxmlWalkNext
An attacker can force the usage of a freed memory area via mxmlWalkNext() of Mini-XML, in order to trigger a denial of service, and possibly to run code...
Mini-XML: buffer overflow via mxml_write_node
An attacker can trigger a buffer overflow via mxml_write_node() of Mini-XML, in order to trigger a denial of service, and possibly to run code...
Mini-XML: buffer overflow via scan_file
An attacker can trigger a buffer overflow via scan_file() of Mini-XML, in order to trigger a denial of service, and possibly to run code...
Mini-XML: use after free via mxmlAdd
An attacker can force the usage of a freed memory area via mxmlAdd() of Mini-XML, in order to trigger a denial of service, and possibly to run code...
Twig: information disclosure via __toString
An attacker can bypass access restrictions to data via __toString() of Twig, in order to obtain sensitive information...
tcpreplay: out-of-bounds memory reading via do_checksum
An attacker can force a read at an invalid address via do_checksum() of tcpreplay, in order to trigger a denial of service, or to obtain sensitive information...
tcpreplay: NULL pointer dereference via get_layer4_v6
An attacker can force a NULL pointer to be dereferenced via get_layer4_v6() of tcpreplay, in order to trigger a denial of service...
Tcpreplay: NULL pointer dereference via get_ipv6_l4proto
An attacker can force a NULL pointer to be dereferenced via get_ipv6_l4proto() of Tcpreplay, in order to trigger a denial of service...
Firefox/Thunderbird: two vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
Passenger: file reading via REVISION File Symlink
A local attacker can read a file via REVISION File Symlink of Passenger, in order to obtain sensitive information...
Apache mod_auth_mellon: privilege escalation via SAML ECP Headers
An attacker can bypass restrictions via SAML ECP Headers of Apache mod_auth_mellon, in order to escalate his privileges...
Apache mod_auth_mellon: open redirect via Logout URL Checking
An attacker can deceive the user via Logout URL Checking of Apache mod_auth_mellon, in order to redirect him to a malicious site...
libsolv: three vulnerabilities
An attacker can use several vulnerabilities of libsolv...
IBM Power 9: buffer overflow via Boot Loader
An attacker can trigger a buffer overflow via Boot Loader of IBM Power 9, in order to trigger a denial of service, and possibly to run code...
Mozilla NSS: NULL pointer dereference via CERT_DecodeCertPackage
An attacker can force a NULL pointer to be dereferenced via CERT_DecodeCertPackage() of Mozilla NSS, in order to trigger a denial of service...
Node.js js-yaml: denial of service
An attacker can trigger a fatal error of Node.js js-yaml, in order to trigger a denial of service...
F5 BIG-IP: denial of service via Forwarded ICMP PMTU
An attacker can trigger a fatal error via Forwarded ICMP PMTU of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via SSL Virtual Server
An attacker can trigger a fatal error via SSL Virtual Server of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: memory leak via SNMP Zero Request-id
An attacker can create a memory leak via SNMP Zero Request-id of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via HSB Layer 2 Forwarding
An attacker can trigger a fatal error via HSB Layer 2 Forwarding of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via Encrypted SMTP Commands
An attacker can bypass restrictions via Encrypted SMTP Commands of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: privilege escalation via Invalid CRL
An attacker can bypass restrictions via Invalid CRL of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP ASM: Cross Site Scripting via Viewed ASM Violation
An attacker can trigger a Cross Site Scripting via Viewed ASM Violation of F5 BIG-IP ASM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: denial of service via FastL4 Virtual Server Self IP Address
An attacker can trigger a fatal error via FastL4 Virtual Server Self IP Address of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: memory leak via vCMP SNMP Requests
An attacker can create a memory leak via vCMP SNMP Requests of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: information disclosure via REST Framework Login Page
An attacker can bypass access restrictions to data via REST Framework Login Page of F5 BIG-IP, in order to obtain sensitive information...
snapd: privilege escalation via Input Queue Inserted Characters
An attacker can bypass restrictions via Input Queue Inserted Characters of snapd, in order to escalate his privileges...
Ghostscript: code execution via DefineResource Forceput dSAFER Bypass
An attacker can use a vulnerability via DefineResource Forceput dSAFER Bypass of Ghostscript, in order to run code...
Ghostscript: code execution via Superexec Operator dSAFER Bypass
An attacker can use a vulnerability via Superexec Operator dSAFER Bypass of Ghostscript, in order to run code...
NTFS-3G: buffer overflow
An attacker can trigger a buffer overflow of NTFS-3G, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 908 909 910 911 912 913 914 915 916 918 920 921 922 923 924 925 926 927 928 941 961 981 1001 1021 1041 1061 1081 1101 1121 1128