The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SLiRP: buffer overflow via tcp_emu
An attacker, inside a guest system, can trigger a buffer overflow via tcp_emu() of SLiRP, in order to trigger a denial of service, and possibly to run code on the host system...
Wireshark: denial of service via BT ATT Dissector
An attacker can trigger a fatal error via BT ATT Dissector of Wireshark, in order to trigger a denial of service...
Wireshark: denial of service via WASSP Dissector
An attacker can trigger a fatal error via WASSP Dissector of Wireshark, in order to trigger a denial of service...
McAfee ePO: multiple vulnerabilities
An attacker can use several vulnerabilities of McAfee ePO...
Drupal Radix: Cross Site Scripting via Menu Titles Dropdown
An attacker can trigger a Cross Site Scripting via Menu Titles Dropdown of Drupal Radix, in order to run JavaScript code in the context of the web site...
Ansible Core: code execution via nxos_file_copy remote_file
An attacker can use a vulnerability via nxos_file_copy remote_file of Ansible Core, in order to run code...
Ansible Core: code execution via solaris_zone
An attacker can use a vulnerability via solaris_zone of Ansible Core, in order to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Siemens SIMATIC, WinCC: code execution via ActiveX
An attacker can use a vulnerability via ActiveX of Siemens SIMATIC / WinCC, in order to run code...
Linux kernel: use after free via i915_ppgtt_close
An attacker can force the usage of a freed memory area via i915_ppgtt_close() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
VMware Tools for Windows: privilege escalation via Race Condition
An attacker can bypass restrictions via Race Condition of VMware Tools for Windows, in order to escalate his privileges...
GraphicsMagick: out-of-bounds memory reading via EncodeImage
An attacker can force a read at an invalid address via EncodeImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: buffer overflow via ImportRLEPixels
An attacker can trigger a buffer overflow via ImportRLEPixels() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: use after free via ThrowException
An attacker can force the usage of a freed memory area via ThrowException() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
Linux kernel, OpenBSD: information disclosure via Intel GPU EU State During Context Switch
An attacker can bypass access restrictions to data via Intel GPU EU State During Context Switch of the Linux or OpenBSD kernel, in order to obtain sensitive information...
Oracle VM VirtualBox: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Java: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Outside In Technology: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Fusion Middleware: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Database: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Microsoft Windows: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Core: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE: memory corruption
An attacker can trigger a memory corruption of Microsoft IE, in order to trigger a denial of service, and possibly to run code...
SUSE LE: denial of service via man safe-rm
An attacker can trigger a fatal error via man safe-rm of SUSE LE, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 992 993 994 995 996 997 998 999 1000 1002 1004 1005 1006 1007 1008 1009 1010 1011