The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ImageMagick: memory leak via ReadSIXELImage
An attacker can create a memory leak via ReadSIXELImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WritePSDChannel
An attacker can create a memory leak via WritePSDChannel() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via DecodeImage
An attacker can create a memory leak via DecodeImage() of ImageMagick, in order to trigger a denial of service...
LibGD: buffer overflow via gdImageColorMatch
An attacker can trigger a buffer overflow via gdImageColorMatch() of LibGD, in order to trigger a denial of service, and possibly to run code...
Ansible Tower: information disclosure via Credentials In Environment Variables
An attacker can bypass access restrictions to data via Credentials In Environment Variables of Ansible Tower, in order to obtain sensitive information...
WebSphere AS: infinite loop via Admin Console
An attacker can trigger an infinite loop via Admin Console of WebSphere AS, in order to trigger a denial of service...
OVMF: buffer overflow via HII Database Bitmap
An attacker can trigger a buffer overflow via HII Database Bitmap of OVMF, in order to trigger a denial of service, and possibly to run code...
Magento Commerce/OpenSource: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento Commerce/OpenSource...
Node.js opencv: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Node.js opencv, in order to run code...
Joomla TCPDF Library: vulnerability
A vulnerability of Joomla TCPDF Library was announced...
Joomla AcyMailing: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla AcyMailing, in order to run JavaScript code in the context of the web site...
oVirt: denial of service via REST API RemoveDiskCommand
An attacker can trigger a fatal error via REST API RemoveDiskCommand of oVirt, in order to trigger a denial of service...
Micro Focus Data Protector: code execution
An attacker can use a vulnerability of Micro Focus Data Protector, in order to run code...
SUSE blueman: privilege escalation via Polkit Authorization
An attacker can bypass restrictions via Polkit Authorization of SUSE blueman, in order to escalate his privileges...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Bash: privilege escalation via Rbash BASH_CMDS Modification
An attacker can bypass restrictions via Rbash BASH_CMDS Modification of Bash, in order to escalate his privileges...
XnView: eight vulnerabilities
An attacker can use several vulnerabilities of XnView...
Python urllib: file reading via Blacklist Bypass
A local attacker can read a file via Blacklist Bypass of Python urllib, in order to obtain sensitive information...
Python urllib2: information disclosure via CRLF Injection HTTP/Redis
An attacker can bypass access restrictions to data via CRLF Injection HTTP/Redis of Python urllib2, in order to obtain sensitive information...
Python urllib2: information disclosure via CRLF Injection
An attacker can bypass access restrictions to data via CRLF Injection of Python urllib2, in order to obtain sensitive information...
WordPress Social Warfare: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Social Warfare, in order to run JavaScript code in the context of the web site...
SQLite: NULL pointer dereference via FTS5 Transaction Interleaving Read
An attacker can force a NULL pointer to be dereferenced via FTS5 Transaction Interleaving Read of SQLite, in order to trigger a denial of service...
SQLite: out-of-bounds memory reading via FTS5 Transaction Prefix Queries
An attacker can force a read at an invalid address via FTS5 Transaction Prefix Queries of SQLite, in order to trigger a denial of service, or to obtain sensitive information...
Apache Tomcat: denial of service via HTTP/2 Frames
An attacker can trigger a fatal error via HTTP/2 Frames of Apache Tomcat, in order to trigger a denial of service...
RuggedCom ROX: multiple vulnerabilities
An attacker can use several vulnerabilities of RuggedCom ROX...
libarchive: NULL pointer dereference via archive_acl_from_text_l
An attacker can force a NULL pointer to be dereferenced via archive_acl_from_text_l() of libarchive, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 909 910 911 912 913 914 915 916 917 919 921 922 923 924 925 926 927 928 929 941 961 981 1001 1021 1041 1061 1081 1101 1116