The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
mgetty: infinite loop via g3/g32pbm.c
An attacker can trigger an infinite loop via g3/g32pbm.c of mgetty, in order to trigger a denial of service...
MariaDB Connector/C: use after free via client_mpvio_read_packet
An attacker can force the usage of a freed memory area via client_mpvio_read_packet() of MariaDB Connector/C, in order to trigger a denial of service, and possibly to run code...
Drupal Forms Steps: information disclosure
An attacker can bypass access restrictions to data of Drupal Forms Steps, in order to obtain sensitive information...
Drupal External Links Filter: open redirect
An attacker can deceive the user of Drupal External Links Filter, in order to redirect him to a malicious site...
Drupal Super Login: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Super Login, in order to run JavaScript code in the context of the web site...
Drupal Scroll To Top: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Scroll To Top, in order to run JavaScript code in the context of the web site...
Go: information disclosure via Net/url Authorization Bypass
An attacker can bypass access restrictions to data via Net/url Authorization Bypass of Go, in order to obtain sensitive information...
FFmpeg: memory corruption via aa_read_header
An attacker can trigger a memory corruption via aa_read_header() of FFmpeg, in order to trigger a denial of service, and possibly to run code...
LibreOffice: three vulnerabilities
An attacker can use several vulnerabilities of LibreOffice...
FreeType: out-of-bounds memory reading via T1_Get_Private_Dict
An attacker can force a read at an invalid address via T1_Get_Private_Dict() of FreeType, in order to trigger a denial of service, or to obtain sensitive information...
Ansible Core: information disclosure via GCP Modules Logged Credentials
An attacker can bypass access restrictions to data via GCP Modules Logged Credentials of Ansible Core, in order to obtain sensitive information...
Ansible Core: information disclosure via Templating Passwords On Prompt
An attacker can bypass access restrictions to data via Templating Passwords On Prompt of Ansible Core, in order to obtain sensitive information...
Apache httpd: six vulnerabilities
An attacker can use several vulnerabilities of Apache httpd...
Firefox: information disclosure via Stored Passwords Copy
An attacker can bypass access restrictions to data via Stored Passwords Copy of Firefox, in order to obtain sensitive information...
Nessus: denial of service via File Overwritte
An attacker can trigger a fatal error via File Overwritte of Nessus, in order to trigger a denial of service...
Joomla Core: privilege escalation via Com_contact Mail Submission
An attacker can bypass restrictions via Com_contact Mail Submission of Joomla Core, in order to escalate his privileges...
SIMATIC: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC...
Linux kernel: use after free via __blk_drain_queue
An attacker can force the usage of a freed memory area via __blk_drain_queue() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via net/ipv6/ip6mr.c
An attacker can trigger a memory corruption via net/ipv6/ip6mr.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
McAfee Web Gateway: two vulnerabilities
An attacker can use several vulnerabilities of McAfee Web Gateway...
IBM API Connect: privilege escalation via Ubuntu Security Patches Removal
An attacker can bypass restrictions via Ubuntu Security Patches Removal of IBM API Connect, in order to escalate his privileges...
Go: information disclosure via Message Forgery
An attacker can bypass access restrictions to data via Message Forgery of Go, in order to obtain sensitive information...
Go: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Go, in order to execute code...
Go: information disclosure via Process Creation
An attacker can bypass access restrictions to data via Process Creation of Go, in order to obtain sensitive information...
IBM API Connect: denial of service via Unprotected API
An attacker can trigger a fatal error via Unprotected API of IBM API Connect, in order to trigger a denial of service...
Jhead: two vulnerabilities
An attacker can use several vulnerabilities of Jhead...
igraph: NULL pointer dereference via igraph_i_strdiff
An attacker can force a NULL pointer to be dereferenced via igraph_i_strdiff() of igraph, in order to trigger a denial of service...
Bluetooth BR/EDR: information disclosure via Key Negotiation
An attacker can bypass access restrictions to data via Key Negotiation of Bluetooth BR/EDR, in order to obtain sensitive information...
HTTP/2: multiple vulnerabilities
An attacker can use several vulnerabilities of HTTP/2...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 949 950 951 952 953 954 955 956 957 959 961 962 963 964 965 966 967 968 969 981 1001 1012