The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
LibreOffice: information disclosure via Stealth Mode Bullet Graphics
An attacker can bypass access restrictions to data via Stealth Mode Bullet Graphics of LibreOffice, in order to obtain sensitive information...
LibreOffice: code execution via LibreLogo Python Commands
An attacker can use a vulnerability via LibreLogo Python Commands of LibreOffice, in order to run code...
WavPack: three vulnerabilities
An attacker can use several vulnerabilities of WavPack...
Oracle Java: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Oracle VM VirtualBox: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Oracle Outside In Technology: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Oracle Fusion Middleware: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Apache Tika: infinite loop via SQLite3Parser
An attacker can trigger an infinite loop via SQLite3Parser of Apache Tika, in order to trigger a denial of service...
Oracle Berkeley DB: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
Oracle Database: vulnerabilities of July 2019
Several vulnerabilities were announced in Oracle products...
RHEL 7.5: denial of service via 389-ds-base
An attacker can trigger a fatal error via 389-ds-base of RHEL 7.5, in order to trigger a denial of service...
WordPress Everest Forms: SQL injection
An attacker can use a SQL injection of WordPress Everest Forms, in order to read or alter data...
Node.js lodash: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js lodash, in order to escalate his privileges...
Palo Alto PAN-OS: privilege escalation via Management API username/password
An attacker can bypass restrictions via Management API username/password of Palo Alto PAN-OS, in order to escalate his privileges...
Palo Alto PAN-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Palo Alto PAN-OS, in order to escalate his privileges...
Google Chrome: three vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Exiv2: NULL pointer dereference via HTTP Unspaced Response
An attacker can force a NULL pointer to be dereferenced via HTTP Unspaced Response of Exiv2, in order to trigger a denial of service...
Exiv2: assertion error via CRW Image
An attacker can force an assertion error via CRW Image of Exiv2, in order to trigger a denial of service...
Exiv2: denial of service via PngChunk-parseChunkContent
An attacker can trigger a fatal error via PngChunk::parseChunkContent() of Exiv2, in order to trigger a denial of service...
Exiv2: integer overflow via CiffDirectory-readDirectory
An attacker can trigger an integer overflow via CiffDirectory::readDirectory() of Exiv2, in order to trigger a denial of service, and possibly to run code...
FlightCrew: infinite loop via ZIP Archive
An attacker can trigger an infinite loop via ZIP Archive of FlightCrew, in order to trigger a denial of service...
FlightCrew: directory traversal via ZIP Archive
An attacker can traverse directories via ZIP Archive of FlightCrew, in order to create a file outside the service root path...
FlightCrew: NULL pointer dereference via GetRelativePathToNcx
An attacker can force a NULL pointer to be dereferenced via GetRelativePathToNcx() of FlightCrew, in order to trigger a denial of service...
radare2: denial of service via rcc_context
An attacker can trigger a fatal error via rcc_context() of radare2, in order to trigger a denial of service...
radare2: out-of-bounds memory reading via r_egg_lang_parsechar
An attacker can force a read at an invalid address via r_egg_lang_parsechar() of radare2, in order to trigger a denial of service, or to obtain sensitive information...
Node.js Modules: malicious code
Several Node.js modules are malicious, which can be used by an attacker in order to run code...
VideoLAN VLC: memory corruption via MP4_EIA608_Convert
An attacker can trigger a memory corruption via MP4_EIA608_Convert() of VideoLAN VLC, in order to trigger a denial of service, and possibly to run code...
iptables: buffer overflow via iptables-restore
An attacker can trigger a buffer overflow via iptables-restore of iptables, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 940 941 942 943 944 945 946 947 948 950 952 953 954 955 956 957 958 959 960 961 981 1001 1011