The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js bootstrap-select: Cross Site Scripting via title
An attacker can trigger a Cross Site Scripting via title of Node.js bootstrap-select, in order to run JavaScript code in the context of the web site...
Mozilla NSS: vulnerability via DSA
A vulnerability via DSA of Mozilla NSS was announced...
Microsoft Windows: four vulnerabilities
An attacker can use several vulnerabilities of Microsoft Windows...
Wireshark: denial of service via NFS
An attacker can send malicious NFS packets to Wireshark, in order to trigger a denial of service...
libexif: three vulnerabilities
An attacker can use several vulnerabilities of libexif...
ISC BIND: overload via NXNSAttack On DNS Recursive Resolvers
An attacker can trigger an overload via NXNSAttack On DNS Recursive Resolvers of ISC BIND, in order to trigger a denial of service...
Transmission: use after free via variant.c
An attacker can force the usage of a freed memory area in variant.c of Transmission, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via xfs
An attacker can trigger long delay in a xfs operation of the Linux kernel, in order to trigger a denial of service...
moodle: code execution via SCORM
An attacker can use a vulnerability via SCORM of moodle, in order to run code...
F5 BIG-IP: physical memory corruption via Rowhammer
An attacker can trigger a physical memory corruption via a Rowhammer like attack against F5 BIG-IP, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via the VFIO device driver
An attacker, inside a guest system, can trigger a fatal error via VFIO of the Linux kernel, in order to trigger a denial of service on the host system...
ISC BIND: overload via NXNSAttack On Recursive Resolvers
An attacker can trigger an overload via NXNSAttack On Recursive Resolvers of ISC BIND, in order to trigger a denial of service...
Ignite Openfire: Cross Site Scripting via Admin Console
An attacker can trigger a Cross Site Scripting via Admin Console of Ignite Openfire, in order to run JavaScript code in the context of the web site...
NLnet Labs Unbound: overload via NXNSAttack On Recursive Resolvers
An attacker can trigger an overload via NXNSAttack On Recursive Resolvers of NLnet Labs Unbound, in order to trigger a denial of service...
Check Point Security Gateway: lack of enforcemetn of authentication rules
An attacker can bypass restrictions of Check Point Security Gateway, in order to escalate his privileges...
Linux kernel: use after free
An attacker can force the usage of a freed memory area of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
sane: seven vulnerabilities
An attacker can use several vulnerabilities of sane...
OpenBSD ssh-keygen: NULL pointer dereference via a FIDO token
An attacker can force a NULL pointer to be dereferenced when using a FIDO token with OpenBSD ssh-keygen, in order to trigger a denial of service...
perl-Mojolicious: vulnerability
A vulnerability of perl-Mojolicious was announced...
DPDK: five vulnerabilities
An attacker can use several vulnerabilities of DPDK...
Dovecot: three vulnerabilities
An attacker can use several vulnerabilities of Dovecot...
LibreOffice: information disclosure by encryption disabling
An attacker can corrupt an encrypted MS-Office document to be edited with LibreOffice, in order to disable the encryption on next save and so get sensitive data...
SUSE autoyast2: unchecked recording of PGP keys
An attacker can make SUSE autoyast2 point to a package archive, in order to make it import unchecked PGP signature keys...
Node.js kerberos: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Node.js kerberos, in order to execute code...
Nextcloud: two vulnerabilities
An attacker can use several vulnerabilities of Nextcloud...
IBM i SQL: information disclosure
An attacker can bypass access restrictions to data of IBM i SQL, in order to obtain sensitive information...
condor: privilege escalation via condor_startd
An attacker can bypass restrictions via condor_startd of condor, in order to escalate his privileges...
sleuthkit: buffer overflow
An attacker can trigger a buffer overflow of sleuthkit, in order to trigger a denial of service, and possibly to run code...
libexif: information disclosure via exif_data_save_data_entry
A local attacker can read a memory fragment via exif_data_save_data_entry() of libexif, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1024 1025 1026 1027 1028 1029 1030 1031 1032 1034