The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 Apport: denial of service via Lock File Creation
An attacker can trigger a fatal error via Lock File Creation of Apport, in order to trigger a denial of service...
1 Apport: information disclosure via Container Crash Dumps
An attacker can bypass access restrictions to data via Container Crash Dumps of Apport, in order to obtain sensitive information...
1 Apport: information disclosure via Core Dump Creation
An attacker can bypass access restrictions to data via Core Dump Creation of Apport, in order to obtain sensitive information...
2 Apport: file reading
A local attacker can read a file of Apport, in order to obtain sensitive information...
2 Whoopsie: code execution via Large Crash Report
An attacker can use a vulnerability via Large Crash Report of Whoopsie, in order to run code...
2 FortiClient for Mac OS: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of FortiClient for Mac OS, in order to escalate his privileges...
3 GNU libidn2: buffer overflow via idn2_to_ascii_4i
An attacker can trigger a buffer overflow via idn2_to_ascii_4i() of GNU libidn2, in order to trigger a denial of service, and possibly to run code...
3 GNU libidn2: privilege escalation via A-labels To U-labels Conversion
An attacker can bypass restrictions via A-labels To U-labels Conversion of GNU libidn2, in order to escalate his privileges...
2 Samba: three vulnerabilities
An attacker can use several vulnerabilities of Samba...
3 Trend Micro OfficeScan: privilege escalation via Root Login Bypass
An attacker can bypass restrictions via Root Login Bypass of Trend Micro OfficeScan, in order to escalate his privileges...
3 Trend Micro OfficeScan: directory traversal via ZIP
An attacker can traverse directories of Trend Micro OfficeScan, in order to create a file outside the service root path...
2 LZ4: buffer overflow via LZ4_write32
An attacker can trigger a buffer overflow via LZ4_write32() of LZ4, in order to trigger a denial of service, and possibly to run code...
2 Apache Commons Compress: infinite loop via File Name Encoding
An attacker can trigger an infinite loop via File Name Encoding of Apache Commons Compress, in order to trigger a denial of service...
2 Xpdf: out-of-bounds memory reading via FoFiType1C-convertToType0
An attacker can force a read at an invalid address via FoFiType1C::convertToType0() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
2 Xpdf: out-of-bounds memory reading via FoFiType1C-convertToType1
An attacker can force a read at an invalid address via FoFiType1C::convertToType1() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
2 Xpdf: out-of-bounds memory reading via FlateStream-getChar
An attacker can force a read at an invalid address via FlateStream::getChar() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
2 Xpdf: out-of-bounds memory reading via JBIG2Stream-readTextRegionSeg
An attacker can force a read at an invalid address via JBIG2Stream::readTextRegionSeg() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
2 Xpdf: out-of-bounds memory reading via FoFiType1-parse
An attacker can force a read at an invalid address via FoFiType1::parse() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
2 Xpdf: out-of-bounds memory reading via SampledFunction-transform
An attacker can force a read at an invalid address via SampledFunction::transform() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
3 Xpdf: buffer overflow via DCTStream-decodeImage
An attacker can trigger a buffer overflow via DCTStream::decodeImage() of Xpdf, in order to trigger a denial of service, and possibly to run code...
1 mod_auth_openidc: open redirect via Logout Backslashes Url
An attacker can deceive the user via Logout Backslashes Url of mod_auth_openidc, in order to redirect him to a malicious site...
3 mod_auth_openidc: privilege escalation via OIDCUnAuthAction Pass
An attacker can bypass restrictions via OIDCUnAuthAction Pass of mod_auth_openidc, in order to escalate his privileges...
2 Go: assertion error via dsa.Verify
An attacker can force an assertion error via dsa.Verify() of Go, in order to trigger a denial of service...
2 Mosquitto: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of Mosquitto, in order to trigger a denial of service...
2 libarchive: use after free via archive_read_format_rar_read_data
An attacker can force the usage of a freed memory area via archive_read_format_rar_read_data() of libarchive, in order to trigger a denial of service, and possibly to run code...
2 Ignite Openfire: privilege escalation via FaviconServlet.java GET Requests
An attacker can bypass restrictions via FaviconServlet.java GET Requests of Ignite Openfire, in order to escalate his privileges...
2 Ignite Openfire: directory traversal via PluginServlet.java
An attacker can traverse directories via PluginServlet.java of Ignite Openfire, in order to read a file outside the service root path...
1 TeamViewer: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of TeamViewer, in order to execute code...
2 VMware ESXi/Workstation: denial of service via Shader
An attacker can trigger a fatal error via Shader of VMware ESXi/Workstation, in order to trigger a denial of service...
2 VMware vCenter Server Appliance: information disclosure via File-Based Backup and Restore
An attacker can bypass access restrictions to data via File-Based Backup and Restore of VMware vCenter Server Appliance, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 972 973 974 975 976 977 978 979 980 982 984 985 986 987 988 989 990 991 992 994