The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Linux kernel: multiple vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...
Linux kernel: five vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...
Linux kernel: memory leak via unittest_data_add
An attacker can create a memory leak via unittest_data_add() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: five vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...
Linux kernel: three vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...
Linux kernel: memory leak via nfp_abm_u32_knode_replace
An attacker can create a memory leak via nfp_abm_u32_knode_replace() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: two vulnerabilities via Memory Leak
An attacker can use several vulnerabilities via Memory Leak of the Linux kernel...
Linux kernel: memory leak via qrtr_tun_write_iter
An attacker can create a memory leak via qrtr_tun_write_iter() of the Linux kernel, in order to trigger a denial of service...
Micro Focus Operations Agent: external XML entity injection
An attacker can transmit malicious XML data to Micro Focus Operations Agent, in order to read a file, scan sites, or trigger a denial of service...
ncurses: out-of-bounds memory reading via fmt_entry
An attacker can force a read at an invalid address via fmt_entry() of ncurses, in order to trigger a denial of service, or to obtain sensitive information...
ncurses: out-of-bounds memory reading via _nc_find_entry
An attacker can force a read at an invalid address via _nc_find_entry() of ncurses, in order to trigger a denial of service, or to obtain sensitive information...
python-psutil: use after free
An attacker can force the usage of a freed memory area of python-psutil, in order to trigger a denial of service, and possibly to run code...
Redmine: SQL injection
An attacker can use a SQL injection of Redmine, in order to read or alter data...
FortiClient for Linux: four vulnerabilities via IPC Socket
An attacker can use several vulnerabilities via IPC Socket of FortiClient for Linux...
OpenBSD: privilege escalation via ifioctl
An attacker can bypass restrictions via ifioctl of OpenBSD, in order to escalate his privileges...
OpenBSD: NULL pointer dereference via net80211
An attacker can force a NULL pointer to be dereferenced via net80211 of OpenBSD, in order to trigger a denial of service...
Enigmail: information disclosure via Encrypted Mail Response
An attacker can bypass access restrictions to data via Encrypted Mail Response of Enigmail, in order to obtain sensitive information...
Angular: Cross Site Scripting via xlink-href Attributes
An attacker can trigger a Cross Site Scripting via xlink:href Attributes of Angular, in order to run JavaScript code in the context of the web site...
Node.js handlebars: code execution via Lookup Helper
An attacker can use a vulnerability via Lookup Helper of Node.js handlebars, in order to run code...
Enigmail: information disclosure via SKS Keyserver Network Attack
An attacker can bypass access restrictions to data via SKS Keyserver Network Attack of Enigmail, in order to obtain sensitive information...
X11 Mesa 3D Graphics: information disclosure via Shared Memory
An attacker can bypass access restrictions to data via Shared Memory of X11 Mesa 3D Graphics, in order to obtain sensitive information...
FortiOS: information disclosure via Private Keys
An attacker can bypass access restrictions to data via Private Keys of FortiOS, in order to obtain sensitive information...
Symantec Endpoint Protection: six vulnerabilities
An attacker can use several vulnerabilities of Symantec Endpoint Protection...
FreeRADIUS: denial of service via Multithreaded BN_CTX Access
An attacker can trigger a fatal error via Multithreaded BN_CTX Access of FreeRADIUS, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via btrfs_verify_dev_extents
An attacker can force a NULL pointer to be dereferenced via btrfs_verify_dev_extents() of the Linux kernel, in order to trigger a denial of service...
OTRS Help Desk: infinite loop via Long Extensions Filenames
An attacker can trigger an infinite loop via Long Extensions Filenames of OTRS Help Desk, in order to trigger a denial of service...
OTRS Help Desk: information disclosure via Ticket List
An attacker can bypass access restrictions to data via Ticket List of OTRS Help Desk, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 978 979 980 981 982 983 984 985 986 988 990 991 992 993 994 995 996 997 998 1001 1003