The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Evince: integer overflow via tiff_document_render
An attacker can trigger an integer overflow via tiff_document_render() of Evince, in order to trigger a denial of service, and possibly to run code...
IBM QRadar SIEM: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of IBM QRadar SIEM, in order to force the victim to perform operations...
Simple DirectMedia Layer: multiple vulnerabilities
An attacker can use several vulnerabilities of Simple DirectMedia Layer...
Simple DirectMedia Layer: integer overflow via SDL2_image
An attacker can trigger an integer overflow via SDL2_image() of Simple DirectMedia Layer, in order to trigger a denial of service, and possibly to run code...
Node.js tar: file corruption
A local attacker can create a hard link, in order to alter the pointed file, with privileges of Node.js tar...
Node.js Modules: malicious code
Several Node.js modules are malicious, which can be used by an attacker in order to run code...
PuTTY: three vulnerabilities
An attacker can use several vulnerabilities of PuTTY...
Fortinet FortiOS, FortiManager: Man-in-the-Middle via Improper Certificate Revocation
An attacker can act as a Man-in-the-Middle via Improper Certificate Revocation on Fortinet FortiOS, FortiManager, in order to read or write data in the session...
Exim: code execution via Sort Expansion Operator
An attacker can use a vulnerability via Sort Expansion Operator of Exim, in order to run code...
WordPress Viral Quiz Maker: SQL injection
An attacker can use a SQL injection of WordPress Viral Quiz Maker, in order to read or alter data...
WordPress Adaptive Images: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Adaptive Images...
Linux kernel: denial of service via Powerpc Hardware Transactional Memory
An attacker can trigger a fatal error via Powerpc Hardware Transactional Memory of the Linux kernel, in order to trigger a denial of service...
WordPress wp-code-highlightjs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress wp-code-highlightjs, in order to run JavaScript code in the context of the web site...
ProFTPD: read-write access via mod_copy Limit Bypass
An attacker can bypass access restrictions via mod_copy Limit Bypass of ProFTPD, in order to read or alter data...
GNU patch: read-write access via Symlink Following
An attacker can bypass access restrictions via Symlink Following of GNU patch, in order to read or alter data...
exiv2: out-of-bounds memory reading via Exiv2-MrwImage-readMetadata
An attacker can force a read at an invalid address via Exiv2::MrwImage::readMetadata() of exiv2, in order to trigger a denial of service, or to obtain sensitive information...
Clementine Music Player: NULL pointer dereference via MoodbarPipeline-NewPadCallback
An attacker can force a NULL pointer to be dereferenced via MoodbarPipeline::NewPadCallback() of Clementine Music Player, in order to trigger a denial of service...
Ledger: buffer overflow via parse_date_mask_routine
An attacker can trigger a buffer overflow via parse_date_mask_routine() of Ledger, in order to trigger a denial of service, and possibly to run code...
Ledger: buffer overflow via find_option
An attacker can trigger a buffer overflow via find_option() of Ledger, in order to trigger a denial of service, and possibly to run code...
Ledger-CLI: use after free via Account Parsing
An attacker can force the usage of a freed memory area via Account Parsing of Ledger-CLI, in order to trigger a denial of service, and possibly to run code...
Ledger-CLI: buffer overflow via Tag Parsing
An attacker can trigger a buffer overflow via Tag Parsing of Ledger-CLI, in order to trigger a denial of service, and possibly to run code...
Palo Alto PAN-OS: code execution via GlobalProtect
An attacker can use a vulnerability via GlobalProtect of Palo Alto PAN-OS, in order to run code...
Pivotal Cloud Foundry BOSH Backup and Restore CLI: information disclosure via Job Metadata File
An attacker can bypass access restrictions to data via Job Metadata File of Pivotal Cloud Foundry BOSH Backup and Restore CLI, in order to obtain sensitive information...
VideoLAN VLC: out-of-bounds memory reading via lavc_CopyPicture
An attacker can force a read at an invalid address via lavc_CopyPicture() of VideoLAN VLC, in order to trigger a denial of service, or to obtain sensitive information...
Avast Antivirus: denial of service via Log File Link
An attacker can trigger a fatal error via Log File Link of Avast Antivirus, in order to trigger a denial of service...
Cisco Aironet: denial of service via 802.11r Fast Transition
An attacker can trigger a fatal error via 802.11r Fast Transition of Cisco Aironet, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 942 943 944 945 946 947 948 949 950 952 954 955 956 957 958 959 960 961 962 981 1001 1020