The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Centreon: privilege escalation via cwrapper_perl
An attacker can bypass restrictions via cwrapper_perl of Centreon, in order to escalate his privileges...
Linux kernel: information disclosure via flow_dissector
An attacker can bypass access restrictions to data via flow_dissector of the Linux kernel, in order to obtain sensitive information...
icingaweb2: five vulnerabilities
An attacker can use several vulnerabilities of icingaweb2...
XAR: privilege escalation via Package Signature Validation
An attacker can bypass restrictions via Package Signature Validation of XAR, in order to escalate his privileges...
QEMU: directory traversal via SLiRP TFTP Server
An attacker can traverse directories via SLiRP TFTP Server of QEMU, in order to read a file outside the service root path...
FontForge: buffer overflow via Type2NotDefSplines
An attacker can trigger a buffer overflow via Type2NotDefSplines() of FontForge, in order to trigger a denial of service, and possibly to run code...
FontForge: use after free via SFD_GetFontMetaData
An attacker can force the usage of a freed memory area via SFD_GetFontMetaData() of FontForge, in order to trigger a denial of service, and possibly to run code...
Lifesize Icon: security improvement
The security of Lifesize Icon was improved...
SLiRP: buffer overflow via tcp_emu
An attacker, inside a guest system, can trigger a buffer overflow via tcp_emu() of SLiRP, in order to trigger a denial of service, and possibly to run code on the host system...
Wireshark: denial of service via BT ATT Dissector
An attacker can trigger a fatal error via BT ATT Dissector of Wireshark, in order to trigger a denial of service...
Wireshark: denial of service via WASSP Dissector
An attacker can trigger a fatal error via WASSP Dissector of Wireshark, in order to trigger a denial of service...
McAfee ePO: multiple vulnerabilities
An attacker can use several vulnerabilities of McAfee ePO...
Drupal Radix: Cross Site Scripting via Menu Titles Dropdown
An attacker can trigger a Cross Site Scripting via Menu Titles Dropdown of Drupal Radix, in order to run JavaScript code in the context of the web site...
Ansible Core: code execution via nxos_file_copy remote_file
An attacker can use a vulnerability via nxos_file_copy remote_file of Ansible Core, in order to run code...
Ansible Core: code execution via solaris_zone
An attacker can use a vulnerability via solaris_zone of Ansible Core, in order to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Siemens SIMATIC, WinCC: code execution via ActiveX
An attacker can use a vulnerability via ActiveX of Siemens SIMATIC / WinCC, in order to run code...
Linux kernel: use after free via i915_ppgtt_close
An attacker can force the usage of a freed memory area via i915_ppgtt_close() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
VMware Tools for Windows: privilege escalation via Race Condition
An attacker can bypass restrictions via Race Condition of VMware Tools for Windows, in order to escalate his privileges...
GraphicsMagick: out-of-bounds memory reading via EncodeImage
An attacker can force a read at an invalid address via EncodeImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: buffer overflow via ImportRLEPixels
An attacker can trigger a buffer overflow via ImportRLEPixels() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: use after free via ThrowException
An attacker can force the usage of a freed memory area via ThrowException() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
Linux kernel, OpenBSD: information disclosure via Intel GPU EU State During Context Switch
An attacker can bypass access restrictions to data via Intel GPU EU State During Context Switch of the Linux or OpenBSD kernel, in order to obtain sensitive information...
Oracle VM VirtualBox: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Java: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Outside In Technology: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 992 993 994 995 996 997 998 999 1000 1002 1004 1005 1006 1007 1008 1009 1010 1011 1012 1021 1041 1061 1081 1091