The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM QRadar SIEM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site...
OpenAFS: three vulnerabilities
An attacker can use several vulnerabilities of OpenAFS...
cpio: file creation via Restore
An attacker can bypass access restrictions via Restore of cpio, in order to create a file...
ImageMagick: memory leak via PingImage
An attacker can create a memory leak via PingImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WritePS3Image
An attacker can create a memory leak via WritePS3Image() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via Huffman2DEncodeImage
An attacker can create a memory leak via Huffman2DEncodeImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via AcquireMagickMemory
An attacker can create a memory leak via AcquireMagickMemory() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via XCreateImage
An attacker can create a memory leak via XCreateImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via WriteTIFFImage
An attacker can force a read at an invalid address via WriteTIFFImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: use after free via UnmapBlob
An attacker can force the usage of a freed memory area via UnmapBlob() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
Synology DSM: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology DSM...
Linux kernel: NULL pointer dereference via rds_tcp_kill_sock
An attacker can force a NULL pointer to be dereferenced via rds_tcp_kill_sock() of the Linux kernel, in order to trigger a denial of service...
Avast Antivirus: Cross Site Scripting via Network Notification Popup
An attacker can trigger a Cross Site Scripting via Network Notification Popup of Avast Antivirus, in order to run JavaScript code in the context of the web site...
Sonatype Nexus Repository Manager: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Sonatype Nexus Repository Manager, in order to run code...
Microsoft Excel for Mac: code execution via SYLK Macro Execution
An attacker can use a vulnerability via SYLK Macro Execution of Microsoft Excel for Mac, in order to run code...
Google Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
IBM MQ: denial of service via Special Messages
An attacker can trigger a fatal error via Special Messages of IBM MQ, in order to trigger a denial of service...
IBM MQ: denial of service via Tracing
An attacker can trigger a fatal error via Tracing of IBM MQ, in order to trigger a denial of service...
T1utils: multiple vulnerabilities
An attacker can use several vulnerabilities of T1utils...
WebKitGTK: five vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
Mozilla NSS: memory corruption via sftk_FreeSession
An attacker can trigger a memory corruption via sftk_FreeSession() of Mozilla NSS, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP AFM: SQL injection
An attacker can use a SQL injection of F5 BIG-IP AFM, in order to read or alter data...
F5 BIG-IP: Cross Site Scripting via TMUI
An attacker can trigger a Cross Site Scripting via TMUI of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
Qt qtbase: out-of-bounds memory reading via generateDirectionalRuns
An attacker can force a read at an invalid address via generateDirectionalRuns() of Qt qtbase, in order to trigger a denial of service, or to obtain sensitive information...
Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via ARM Unmasked Interrupts
An attacker, inside a guest system, can bypass restrictions via ARM Unmasked Interrupts of Xen, in order to escalate his privileges on the host system...
Xen: memory corruption via PCI Devices Deassignment
An attacker, inside a guest system, can trigger a memory corruption via PCI Devices Deassignment of Xen, in order to trigger a denial of service, and possibly to run code on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 973 974 975 976 977 978 979 980 981 983 985 986 987 988 989 990 991 992 993 1001 1020