The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
NTP.org: memory leak via Ntp.keys CMAC Algorithm
An attacker can create a memory leak via Ntp.keys CMAC Algorithm of NTP.org, in order to trigger a denial of service...
Continuous Delivery for Puppet Enterprise: information disclosure via Impact Analysis Report
An attacker can bypass access restrictions to data via Impact Analysis Report of Continuous Delivery for Puppet Enterprise, in order to obtain sensitive information...
RHEL 7: privilege escalation via Runc CVE-2016-9962 Regression
An attacker can bypass restrictions via Runc CVE-2016-9962 Regression of RHEL 7, in order to escalate his privileges...
RHEL 7: code execution via Runc CVE-2019-5736 Regression
An attacker can use a vulnerability via Runc CVE-2019-5736 Regression of RHEL 7, in order to run code...
Containers Image: denial of service via Manifest File
An attacker can trigger a fatal error via Manifest File of Containers Image, in order to trigger a denial of service...
Linux kernel: out-of-bounds memory reading via crypto_authenc_extractkeys
An attacker can force a read at an invalid address via crypto_authenc_extractkeys() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Magento Commerce: two vulnerabilities
An attacker can use several vulnerabilities of Magento Commerce...
Chrome: use after free via Extensions
An attacker can force the usage of a freed memory area via Extensions of Chrome, in order to trigger a denial of service, and possibly to run code...
FortiAnalyzer: denial of service via NTP Amplification
An attacker can trigger a fatal error via NTP Amplification of FortiAnalyzer, in order to trigger a denial of service...
Wildfly: code execution via EJB Deserialization
An attacker can use a vulnerability via EJB Deserialization of Wildfly, in order to run code...
Mutt: information disclosure via Connection After Expired Reject
An attacker can bypass access restrictions to data via Connection After Expired Reject of Mutt, in order to obtain sensitive information...
Apache XML Graphics Batik: information disclosure via SSRF
An attacker can bypass access restrictions to data via SSRF of Apache XML Graphics Batik, in order to obtain sensitive information...
RHEL 7 Unbound: denial of service via Amplification
An attacker can trigger a fatal error via Amplification of RHEL 7 Unbound, in order to trigger a denial of service...
Mutt: information disclosure via Response Injection
An attacker can bypass access restrictions to data via Response Injection of Mutt, in order to obtain sensitive information...
Mutt: Man-in-the-Middle via PREAUTH Response
An attacker can act as a Man-in-the-Middle via PREAUTH Response on Mutt, in order to read or write data in the session...
CISOfy Lynis: information disclosure via License Key Data Upload
An attacker can bypass access restrictions to data via License Key Data Upload of CISOfy Lynis, in order to obtain sensitive information...
ngIRCd: out-of-bounds memory reading via IRC_NJOIN
An attacker can force a read at an invalid address via IRC_NJOIN() of ngIRCd, in order to trigger a denial of service, or to obtain sensitive information...
rails: code execution via Cache Store Deserialization
An attacker can use a vulnerability via Cache Store Deserialization of rails, in order to run code...
rails: information disclosure via Strong Parameters
An attacker can bypass access restrictions to data via Strong Parameters of rails, in order to obtain sensitive information...
SUSE osc: privilege escalation via Network Controlled Filesystem Paths
An attacker can bypass restrictions via Network Controlled Filesystem Paths of SUSE osc, in order to escalate his privileges...
Squid cache: denial of service via TLS Handshake
An attacker can trigger a fatal error via TLS Handshake of Squid cache, in order to trigger a denial of service...
rmt-server: denial of service
An attacker can trigger a fatal error of rmt-server, in order to trigger a denial of service...
Python: denial of service via Lib/ipaddress.py Hash Collision
An attacker can trigger a fatal error via Lib/ipaddress.py Hash Collision of Python, in order to trigger a denial of service...
Linux kernel: use after free via SLIP / CAN
An attacker can force the usage of a freed memory area via SLIP / CAN of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Sophos XG Firewall: buffer overflow via Awarrensmtp
An attacker can trigger a buffer overflow via Awarrensmtp of Sophos XG Firewall, in order to trigger a denial of service, and possibly to run code...
Ansible Tower: information disclosure via World Readable Configuration Files
An attacker can bypass access restrictions to data via World Readable Configuration Files of Ansible Tower, in order to obtain sensitive information...
Windows: privilege escalation via Spatial Data Service
An attacker can bypass restrictions via Spatial Data Service of Windows, in order to escalate his privileges...
Linux kernel: information disclosure via prctl
An attacker can bypass access restrictions to data via prctl() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via Indirect Branch Prediction Barrier
An attacker can bypass access restrictions to data via Indirect Branch Prediction Barrier of the Linux kernel, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1034 1035 1036 1037 1038 1039 1040 1041 1042 1044 1046 1047 1048 1049 1050