The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: NULL pointer dereference via nbd_genl_status
An attacker can force a NULL pointer to be dereferenced via nbd_genl_status() of the Linux kernel, in order to trigger a denial of service...
Python: information disclosure via Email Address Multiple At Characters
An attacker can bypass access restrictions to data via Email Address Multiple At Characters of Python, in order to obtain sensitive information...
Apache PDFBox: external XML entity injection
An attacker can transmit malicious XML data to Apache PDFBox, in order to read a file, scan sites, or trigger a denial of service...
libMirage: NULL pointer dereference via NRG Parser
An attacker can force a NULL pointer to be dereferenced via NRG Parser of libMirage, in order to trigger a denial of service...
SRT: buffer overflow via Many Connections
An attacker can trigger a buffer overflow via Many Connections of SRT, in order to trigger a denial of service, and possibly to run code...
NSD: buffer overflow via dname_concatenate
An attacker can trigger a buffer overflow via dname_concatenate() of NSD, in order to trigger a denial of service, and possibly to run code...
Kea DHCP: three vulnerabilities
An attacker can use several vulnerabilities of Kea DHCP...
Roundcube Webmail: information disclosure via Homograph
An attacker can bypass access restrictions to data via Homograph of Roundcube Webmail, in order to obtain sensitive information...
LibreOffice: code execution via LibreLogo Windows 8.3 path
An attacker can use a vulnerability via LibreLogo Windows 8.3 path of LibreOffice, in order to run code...
LibreOffice: code execution via URL Assembly Script Location
An attacker can use a vulnerability via URL Assembly Script Location of LibreOffice, in order to run code...
memcached: out-of-bounds memory reading via conn_to_str
An attacker can force a read at an invalid address via conn_to_str() of memcached, in order to trigger a denial of service, or to obtain sensitive information...
libexpat: out-of-bounds memory reading via XML_GetCurrentLineNumber
An attacker can force a read at an invalid address via XML_GetCurrentLineNumber() of libexpat, in order to trigger a denial of service, or to obtain sensitive information...
PDFResurrect: buffer overflow via pdf_load_pages_kids
An attacker can trigger a buffer overflow via pdf_load_pages_kids() of PDFResurrect, in order to trigger a denial of service, and possibly to run code...
PDFResurrect: buffer overflow via Startxref
An attacker can trigger a buffer overflow via Startxref of PDFResurrect, in order to trigger a denial of service, and possibly to run code...
QEMU: use after free via SLiRP Packet Reassembly
An attacker can force the usage of a freed memory area via SLiRP Packet Reassembly of QEMU, in order to trigger a denial of service, and possibly to run code...
Exim: code execution via TLS SNI Backslash Null
An attacker can use a vulnerability via TLS SNI Backslash Null of Exim, in order to run code...
Stormshield Network Security, Netasq: Cross Site Scripting via Certificate-based Authentication
An attacker can trigger a Cross Site Scripting via Certificate-based Authentication of Stormshield Network Security or Netasq, in order to run JavaScript code in the context of the web site...
Stormshield Network Security, Netasq: Cross Site Request Forgery via Webadmin
An attacker can trigger a Cross Site Request Forgery via Webadmin of Stormshield Network Security or Netasq, in order to force the victim to perform operations...
Stormshield Network Security: Cross Site Scripting via Update Service
An attacker can trigger a Cross Site Scripting via Update Service of Stormshield Network Security, in order to run JavaScript code in the context of the web site...
Asterisk: two vulnerabilities
An attacker can use several vulnerabilities of Asterisk...
Spacewalk: privilege escalation via Client Token Checksums
An attacker can bypass restrictions via Client Token Checksums of Spacewalk, in order to escalate his privileges...
util-linux: privilege escalation via Default Su PATH
An attacker can bypass restrictions via Default Su PATH of util-linux, in order to escalate his privileges...
Pallets Werkzeug: privilege escalation via PIN Randomness
An attacker can bypass restrictions via PIN Randomness of Pallets Werkzeug, in order to escalate his privileges...
Simple DirectMedia Layer: integer overflow via colorhash
An attacker can trigger an integer overflow via colorhash() of Simple DirectMedia Layer, in order to trigger a denial of service, and possibly to run code...
Simple DirectMedia Layer: integer overflow via XPM Image
An attacker can trigger an integer overflow via XPM Image of Simple DirectMedia Layer, in order to trigger a denial of service, and possibly to run code...
Simple DirectMedia Layer: buffer overflow via XCF Image
An attacker can trigger a buffer overflow via XCF Image of Simple DirectMedia Layer, in order to trigger a denial of service, and possibly to run code...
Simple DirectMedia Layer: buffer overflow via PCX Image
An attacker can trigger a buffer overflow via PCX Image of Simple DirectMedia Layer, in order to trigger a denial of service, and possibly to run code...
Simple DirectMedia Layer: out-of-bounds memory reading via BlitNtoN
An attacker can force a read at an invalid address via BlitNtoN() of Simple DirectMedia Layer, in order to trigger a denial of service, or to obtain sensitive information...
WordPress Core: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Linux kernel: buffer overflow via i2c_smbus_xfer_emulated
An attacker can trigger a buffer overflow via i2c_smbus_xfer_emulated() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 956 957 958 959 960 961 962 963 964 966 968 969 970 971 972 973 974 975 976 981 1001 1012