The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
systemd, rc.d: information disclosure via VPN-Tunneled TCP Connections
An attacker can bypass access restrictions to data via VPN-Tunneled TCP Connections of systemd, rc.d, in order to obtain sensitive information...
OpenSSL: information disclosure via Montgomery Squaring rsaz_512_sqr Overflow
An attacker can bypass access restrictions to data via Montgomery Squaring rsaz_512_sqr() Overflow of OpenSSL, in order to obtain sensitive information...
Cacti: two vulnerabilities
An attacker can use several vulnerabilities of Cacti...
phpMyAdmin: Cross Site Scripting via Git Version Information
An attacker can trigger a Cross Site Scripting via Git Version Information of phpMyAdmin, in order to run JavaScript code in the context of the web site...
Linux kernel: denial of service via fpregs_state_valid
An attacker can trigger a fatal error via fpregs_state_valid() of the Linux kernel, in order to trigger a denial of service...
OpenSLP: buffer overflow
An attacker can trigger a buffer overflow of OpenSLP, in order to trigger a denial of service, and possibly to run code...
Munge: privilege escalation
An attacker can bypass restrictions of Munge, in order to escalate his privileges...
OpenCV: denial of service via cv-HOGDescriptor-getDescriptorSize
An attacker can trigger a fatal error via cv::HOGDescriptor::getDescriptorSize() of OpenCV, in order to trigger a denial of service...
OpenCV: out-of-bounds memory reading via HaarEvaluator-OptFeature-calc
An attacker can force a read at an invalid address via HaarEvaluator::OptFeature::calc() of OpenCV, in order to trigger a denial of service, or to obtain sensitive information...
OpenCV: out-of-bounds memory reading via cv-predictOrdered
An attacker can force a read at an invalid address via cv::predictOrdered of OpenCV, in order to trigger a denial of service, or to obtain sensitive information...
Libav: denial of service via range_decode_culshift
An attacker can trigger a fatal error via range_decode_culshift() of Libav, in order to trigger a denial of service...
Libav: out-of-bounds memory reading via decode_frame
An attacker can force a read at an invalid address via decode_frame() of Libav, in order to trigger a denial of service, or to obtain sensitive information...
Libav: out-of-bounds memory reading via mpc8_probe
An attacker can force a read at an invalid address via mpc8_probe() of Libav, in order to trigger a denial of service, or to obtain sensitive information...
Libav: NULL pointer dereference via vc1_decode_frame
An attacker can force a NULL pointer to be dereferenced via vc1_decode_frame() of Libav, in order to trigger a denial of service...
RabbitMQ C Client: integer overflow via amqp_handle_input
An attacker can trigger an integer overflow via amqp_handle_input() of RabbitMQ C Client, in order to trigger a denial of service, and possibly to run code...
Palo Alto PAN-OS: privilege escalation via Low Privileged Custom-role User
An attacker can bypass restrictions via Low Privileged Custom-role User of Palo Alto PAN-OS, in order to escalate his privileges...
SUSE LE: privilege escalation via Symbolic Links
An attacker can bypass restrictions via Symbolic Links of SUSE LE, in order to escalate his privileges...
Dnsmasq: memory leak via DHCP Response Creation
An attacker can create a memory leak via DHCP Response Creation of Dnsmasq, in order to trigger a denial of service...
FFmpeg: buffer overflow via vqa_decode_chunk
An attacker can trigger a buffer overflow via vqa_decode_chunk() of FFmpeg, in order to trigger a denial of service, and possibly to run code...
FFmpeg: NULL pointer dereference via ff_mpeg4_decode_picture_header
An attacker can force a NULL pointer to be dereferenced via ff_mpeg4_decode_picture_header() of FFmpeg, in order to trigger a denial of service...
Wireshark: denial of service via CMS
An attacker can send malicious CMS packets to Wireshark, in order to trigger a denial of service...
Cyrus IMAP: privilege escalation via HTTP Request Authentication Context
An attacker can bypass restrictions via HTTP Request Authentication Context of Cyrus IMAP, in order to escalate his privileges...
Node.js strapi: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Node.js strapi, in order to escalate his privileges...
Linux kernel: use after free via serial_ir_init_module
An attacker can force the usage of a freed memory area via serial_ir_init_module() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
OpenBSD: privilege escalation via Mesa
An attacker can bypass restrictions via Mesa of OpenBSD, in order to escalate his privileges...
OpenBSD: privilege escalation via libcauth
An attacker can bypass restrictions via libcauth of OpenBSD, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 983 984 985 986 987 988 989 990 991 993 995 996 997 998 999 1000 1001 1002 1003 1021 1041 1061 1080