The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: information disclosure via rcar_drif_g_fmt_sdr_cap
A local attacker can read a memory fragment via rcar_drif_g_fmt_sdr_cap() of the Linux kernel, in order to obtain sensitive information...
Joomla Core: two vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
GNU libiberty: memory leak via demangle_template
An attacker can create a memory leak via demangle_template() of GNU libiberty, in order to trigger a denial of service...
Virt-install: privilege escalation via Guest VM Password Process Listing
An attacker can bypass restrictions via Guest VM Password Process Listing of Virt-install, in order to escalate his privileges...
IBM QRadar SIEM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site...
OpenAFS: three vulnerabilities
An attacker can use several vulnerabilities of OpenAFS...
cpio: file creation via Restore
An attacker can bypass access restrictions via Restore of cpio, in order to create a file...
ImageMagick: memory leak via PingImage
An attacker can create a memory leak via PingImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WritePS3Image
An attacker can create a memory leak via WritePS3Image() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via Huffman2DEncodeImage
An attacker can create a memory leak via Huffman2DEncodeImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via AcquireMagickMemory
An attacker can create a memory leak via AcquireMagickMemory() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via XCreateImage
An attacker can create a memory leak via XCreateImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via WriteTIFFImage
An attacker can force a read at an invalid address via WriteTIFFImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: use after free via UnmapBlob
An attacker can force the usage of a freed memory area via UnmapBlob() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
Synology DSM: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology DSM...
Linux kernel: NULL pointer dereference via rds_tcp_kill_sock
An attacker can force a NULL pointer to be dereferenced via rds_tcp_kill_sock() of the Linux kernel, in order to trigger a denial of service...
Avast Antivirus: Cross Site Scripting via Network Notification Popup
An attacker can trigger a Cross Site Scripting via Network Notification Popup of Avast Antivirus, in order to run JavaScript code in the context of the web site...
Sonatype Nexus Repository Manager: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Sonatype Nexus Repository Manager, in order to run code...
Microsoft Excel for Mac: code execution via SYLK Macro Execution
An attacker can use a vulnerability via SYLK Macro Execution of Microsoft Excel for Mac, in order to run code...
Google Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
IBM MQ: denial of service via Special Messages
An attacker can trigger a fatal error via Special Messages of IBM MQ, in order to trigger a denial of service...
IBM MQ: denial of service via Tracing
An attacker can trigger a fatal error via Tracing of IBM MQ, in order to trigger a denial of service...
T1utils: multiple vulnerabilities
An attacker can use several vulnerabilities of T1utils...
WebKitGTK: five vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
Mozilla NSS: memory corruption via sftk_FreeSession
An attacker can trigger a memory corruption via sftk_FreeSession() of Mozilla NSS, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP AFM: SQL injection
An attacker can use a SQL injection of F5 BIG-IP AFM, in order to read or alter data...
F5 BIG-IP: Cross Site Scripting via TMUI
An attacker can trigger a Cross Site Scripting via TMUI of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
Qt qtbase: out-of-bounds memory reading via generateDirectionalRuns
An attacker can force a read at an invalid address via generateDirectionalRuns() of Qt qtbase, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 974 975 976 977 978 979 980 981 982 984 986 987 988 989 990 991 992 993 994 1001 1003