The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: out-of-bounds memory reading via ide_atapi_cmd_reply_end
An attacker, inside a guest system, can force a read at an invalid address via ide_atapi_cmd_reply_end() of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
glibc: out-of-bounds memory reading via Iconv EUC-KR Encoding
An attacker can force a read at an invalid address via Iconv EUC-KR Encoding of glibc, in order to trigger a denial of service, or to obtain sensitive information...
CairoSVG: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of CairoSVG, in order to trigger a denial of service...
ImageMagick: multiple vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: four vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
Redcarpet: Cross Site Scripting via Quotes
An attacker can trigger a Cross Site Scripting via Quotes of Redcarpet, in order to run JavaScript code in the context of the web site...
DELL EMC Avamar Server: three vulnerabilities
An attacker can use several vulnerabilities of DELL EMC Avamar Server...
Linux kernel: NULL pointer dereference via DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC
An attacker can force a NULL pointer to be dereferenced via DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC of the Linux kernel, in order to trigger a denial of service...
Elasticsearch: information disclosure via Async Search API
An attacker can bypass access restrictions to data via Async Search API of Elasticsearch, in order to obtain sensitive information...
Flatpak: privilege escalation via Sandbox Escape
An attacker, inside a guest system, can bypass restrictions via Sandbox Escape of Flatpak, in order to escalate his privileges on the host system...
Open-iSCSI: multiple vulnerabilities
An attacker can use several vulnerabilities of Open-iSCSI...
Apache Tomcat: information disclosure via NTFS JSP Source Code
An attacker can bypass access restrictions to data via NTFS JSP Source Code of Apache Tomcat, in order to obtain sensitive information...
CPU-X: security improvement
The security of CPU-X was improved...
AdPlug: buffer overflow via CradLoader-load
An attacker can trigger a buffer overflow via CradLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via Ca2mLoader-load
An attacker can trigger a buffer overflow via Ca2mLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CmtkLoader-load
An attacker can trigger a buffer overflow via CmtkLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CdtmLoader-load
An attacker can trigger a buffer overflow via CdtmLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CxadbmfPlayer-__bmf_convert_stream
An attacker can trigger a buffer overflow via CxadbmfPlayer::__bmf_convert_stream() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CmkjPlayer-load
An attacker can trigger a buffer overflow via CmkjPlayer::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: use after free via Cu6mPlayer
An attacker can force the usage of a freed memory area via Cu6mPlayer of AdPlug, in order to trigger a denial of service, and possibly to run code...
lldp: memory leak
An attacker can create a memory leak of lldp, in order to trigger a denial of service...
lldpd: buffer overflow via lldp_decode
An attacker can trigger a buffer overflow via lldp_decode() of lldpd, in order to trigger a denial of service, and possibly to run code...
OpenBSD: use after free via Carp Interface Bpf
An attacker can force the usage of a freed memory area via Carp Interface Bpf of OpenBSD, in order to trigger a denial of service, and possibly to run code...
Junos OS: privilege escalation via SUID Binaries
An attacker can bypass restrictions via SUID Binaries of Junos OS, in order to escalate his privileges...
Junos OS QFX: overload via IP Multicast Traffic Loop
An attacker can trigger an overload via IP Multicast Traffic Loop of Junos OS QFX, in order to trigger a denial of service...
Juniper Junos Space: information disclosure via Clear Text Shared Secrets
An attacker can bypass access restrictions to data via Clear Text Shared Secrets of Juniper Junos Space, in order to obtain sensitive information...
Junos OS: privilege escalation via Request System Software
An attacker can bypass restrictions via Request System Software of Junos OS, in order to escalate his privileges...
Junos OS: privilege escalation via License Check Daemon
An attacker can bypass restrictions via License Check Daemon of Junos OS, in order to escalate his privileges...
Junos OS EX/QFX: memory leak via DHCP Packets
An attacker can create a memory leak via DHCP Packets of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS EX/QFX/SRX: memory leak via 802.1X Authenticator Port Interface Flaps
An attacker can create a memory leak via 802.1X Authenticator Port Interface Flaps of Junos OS EX/QFX/SRX, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1093 1094 1095 1096 1097 1098 1099 1100 1101 1103