The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: denial of service via the es1370 device driver
An attacker can trigger a fatal error via es1370 of QEMU, in order to trigger a denial of service...
knot-resolver: denial of service via NXNSAttack
An attacker can trigger a fatal error via NXNSAttack of knot-resolver, in order to trigger a denial of service...
Drupal Password Reset Landing Page: privilege escalation
An attacker can bypass restrictions of Drupal Password Reset Landing Page, in order to escalate his privileges...
Drupal Commerce: information disclosure
An attacker can bypass access restrictions to data of Drupal Commerce, in order to obtain sensitive information...
Apple iOS: privilege escalation
An attacker can bypass restrictions of the Apple iOS kernel, in order to make some code run with kernel privilege level...
Joomla Fabrik: vulnerability
A vulnerability of Joomla Fabrik was announced...
Linux kernel: SELinux validation bypass for netlink messages
An attacker can bypass SELinux restrictions on netlink messages by bundling them into a unique system call...
QEMU: denial of service via SD Memory Card
An attacker can trigger a fatal error via SD Memory Card of QEMU, in order to trigger a denial of service...
libEMF: multiple vulnerabilities
An attacker can use several vulnerabilities of libEMF...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
JasPer: denial of service via jpc_dec_process_sot
An attacker can trigger a fatal error via jpc_dec_process_sot() of JasPer, in order to trigger a denial of service...
Fortinet FortiClient: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Fortinet FortiClient...
netdata: vulnerability
A vulnerability of netdata was announced...
SQLite: denial of service via sqlite3ExprCodeTarget
An attacker can trigger a fatal error via sqlite3ExprCodeTarget() of SQLite, in order to trigger a denial of service...
SQLite: integer overflow via sqlite3_str_vappendf
An attacker can trigger an integer overflow via sqlite3_str_vappendf() of SQLite, in order to trigger a denial of service, and possibly to run code...
PowerDNS Recursor: information disclosure via gethostname
An attacker can bypass access restrictions to data via gethostname() of PowerDNS Recursor, in order to obtain sensitive information...
RPyC: code execution via Object Attributes
An attacker can use a vulnerability via Object Attributes of RPyC, in order to run code...
OpenBSD 6.7: denial of service via smtpd_sockaddr
An attacker can trigger a fatal error via smtpd_sockaddr of OpenBSD 6.7 (OpenSMTPD), in order to trigger a denial of service...
NLnet Labs Unbound: overload via Answers Parsing
An attacker can trigger an overload via Answers Parsing of NLnet Labs Unbound, in order to trigger a denial of service...
ISC BIND: denial of service via tsig.c
An attacker can trigger a fatal error via tsig.c of ISC BIND, in order to trigger a denial of service...
Apache log4net: external XML entity injection via Configuration Files
An attacker can transmit malicious XML data via Configuration Files to Apache log4net, in order to read a file, scan sites, or trigger a denial of service...
qmail-verify: information disclosure
An attacker can bypass access restrictions to data of qmail-verify, in order to obtain sensitive information...
qmail-verify: spoofing via Mail Address Verification Bypass
An attacker can create spoofed data via Mail Address Verification Bypass of qmail-verify, in order to deceive the victim...
Rack: directory traversal via Rack-Directory
An attacker can traverse directories via Rack::Directory of Rack, in order to read a file outside the service root path...
Grafana: Cross Site Scripting via OpenTSDB Data Source
An attacker can trigger a Cross Site Scripting via OpenTSDB Data Source of Grafana, in order to run JavaScript code in the context of the web site...
Centreon Web: code execution via displayServiceStatus.php
An attacker can use a vulnerability via displayServiceStatus.php of Centreon Web, in order to run code...
QEMU: spoofing via ARM Weak Signature Generation
An attacker can create spoofed data via ARM Weak Signature Generation of QEMU, in order to deceive the victim...
Microsoft Edge Chromium: privilege escalation via Feedback Extension
An attacker can bypass restrictions via Feedback Extension of Microsoft Edge Chromium, in order to escalate his privileges...
PowerDNS Recursor: overload via NXNSAttack On Recursive Resolvers
An attacker can trigger an overload via NXNSAttack On Recursive Resolvers of PowerDNS Recursor, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1026 1027 1028 1029 1030 1031 1032 1033 1034 1036 1038 1039 1040 1041 1042 1043 1044 1045 1046 1053