The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: information disclosure via KVM Missing TLB Flushes
A local attacker, inside a guest system, can read a memory fragment via KVM Missing TLB Flushes of the Linux kernel, in order to obtain sensitive information on the host system...
Linux kernel: information disclosure via ARM64/KVM Debug Registers
An attacker, inside a guest system, can bypass access restrictions to data via ARM64/KVM Debug Registers of the Linux kernel, in order to obtain sensitive information on the host system...
WebSphere AS: memory leak
An attacker can create a memory leak of WebSphere AS, in order to trigger a denial of service...
Links: information disclosure via Tor Clear Dns Prefetch Requests
An attacker can bypass access restrictions to data via Tor Clear Dns Prefetch Requests of Links, in order to obtain sensitive information...
Pillow: buffer overflow via libImaging/SgiRleDecode.c
An attacker can trigger a buffer overflow via libImaging/SgiRleDecode.c of Pillow, in order to trigger a denial of service, and possibly to run code...
Pillow: integer overflow via libImaging/TiffDecode.c
An attacker can trigger an integer overflow via libImaging/TiffDecode.c of Pillow, in order to trigger a denial of service, and possibly to run code...
rmt-server: denial of service via Offline Migration
An attacker can trigger a fatal error via Offline Migration of rmt-server, in order to trigger a denial of service...
SUSE wicked: memory leak via DHCP4 Missing Message Type
An attacker can create a memory leak via DHCP4 Missing Message Type of SUSE wicked, in order to trigger a denial of service...
SUSE wicked: use after free via DHCP6 Client Options
An attacker can force the usage of a freed memory area via DHCP6 Client Options of SUSE wicked, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via opj_t1_clbl_decode_processor
An attacker can trigger a buffer overflow via opj_t1_clbl_decode_processor() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
libsolv: denial of service via repodata_schema2id
An attacker can send malicious repodata_schema2id() packets to libsolv, in order to trigger a denial of service...
Apache XML-RPC: code execution via org.apache.xmlrpc.parser XmlRpcResponseParser-addResult
An attacker can use a vulnerability via org.apache.xmlrpc.parser.XmlRpcResponseParser:addResult of Apache XML-RPC, in order to run code...
Suricata: privilege escalation via TCP FIN Overlapping Signature Bypass
An attacker can bypass restrictions via TCP FIN Overlapping Signature Bypass of Suricata, in order to escalate his privileges...
Suricata: privilege escalation via TCP Timestamp Signature Bypass
An attacker can bypass restrictions via TCP Timestamp Signature Bypass of Suricata, in order to escalate his privileges...
OSSEC HIDS: multiple vulnerabilities
An attacker can use several vulnerabilities of OSSEC HIDS...
Jenkins Plugins: three vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Jenkins Core: seven vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core...
WebKitGTK: three vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
Hiredis: NULL pointer dereference via async.c / dict.c
An attacker can force a NULL pointer to be dereferenced via async.c / dict.c of Hiredis, in order to trigger a denial of service...
apt-cacher-ng: information disclosure via TCP Port 3142
An attacker can bypass access restrictions to data via TCP Port 3142 of apt-cacher-ng, in order to obtain sensitive information...
openSUSE Leap: privilege escalation via apt-cacher-ng
An attacker can bypass restrictions via apt-cacher-ng of openSUSE Leap, in order to escalate his privileges...
Joomla Core: three vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Python: executing DLL code via Windows 7 api-ms-win-core-path-l1-1-0.dll
An attacker can create a malicious Windows 7 api-ms-win-core-path-l1-1-0.dll DLL, and then put it in the current directory of Python, in order to execute code...
Linux kernel: use after free via open may_create_in_sticky
An attacker can force the usage of a freed memory area via open may_create_in_sticky() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
OpenSMTPD: denial of service via Opportunistic TLS Downgrade
An attacker can trigger a fatal error via Opportunistic TLS Downgrade of OpenSMTPD, in order to trigger a denial of service...
OpenSMTPD: code execution via mbox/lmtp Delivery
An attacker can use a vulnerability via mbox/lmtp Delivery of OpenSMTPD, in order to run code...
FreeBSD: information disclosure via Core Dump Thrmisc Data Structure
A local attacker can read a memory fragment via Core Dump Thrmisc Data Structure of FreeBSD, in order to obtain sensitive information...
FreeBSD: privilege escalation via IPsec Replay Window Packet Injection
An attacker can bypass restrictions via IPsec Replay Window Packet Injection of FreeBSD, in order to escalate his privileges...
FreeBSD: buffer overflow via libfetch
An attacker can trigger a buffer overflow via libfetch of FreeBSD, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996 997 998 999 1000 1001 1002 1003 1004 1006 1008 1009 1010 1011 1012 1013 1014 1015 1016 1021 1041 1061 1081 1090