The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
unoconv: information disclosure via Pathnames
An attacker can bypass access restrictions to data via Pathnames of unoconv, in order to obtain sensitive information...
libsrtp: buffer overflow via crypto_policy_set_from_profile_for_rtp
An attacker can trigger a buffer overflow via crypto_policy_set_from_profile_for_rtp() of libsrtp, in order to trigger a denial of service, and possibly to run code...
ipa: overload via Very Long Password
An attacker can trigger an overload via Very Long Password of ipa, in order to trigger a denial of service...
Bootstrap: Cross Site Scripting via Tooltip Data-container Property
An attacker can trigger a Cross Site Scripting via Tooltip Data-container Property of Bootstrap, in order to run JavaScript code in the context of the web site...
libvpx: denial of service
An attacker can trigger a fatal error of libvpx, in order to trigger a denial of service...
Linux kernel: memory corruption via nf_conntrack_h323
An attacker can trigger a memory corruption via nf_conntrack_h323 of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
RHEL Kernel: buffer overflow via NFS Client Direct IO Write
An attacker can trigger a buffer overflow via NFS Client Direct IO Write of RHEL Kernel, in order to trigger a denial of service, and possibly to run code...
WebSphere AS: information disclosure via Specialized Access
An attacker can bypass access restrictions to data via Specialized Access of WebSphere AS, in order to obtain sensitive information...
SPIP: code execution
An attacker can use a vulnerability of SPIP, in order to run code...
Brotli: buffer overflow via One Shot Decompression Request
An attacker can trigger a buffer overflow via One Shot Decompression Request of Brotli, in order to trigger a denial of service, and possibly to run code...
QEMU: NULL pointer dereference via ide_cancel_dma_sync
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via ide_cancel_dma_sync() of QEMU, in order to trigger a denial of service on the host system...
QEMU: NULL pointer dereference via pci_change_irq_level
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via pci_change_irq_level() of QEMU, in order to trigger a denial of service on the host system...
QEMU: NULL pointer dereference via fdctrl_read_data/fdctrl_write_data
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via fdctrl_read_data/fdctrl_write_data() of QEMU, in order to trigger a denial of service on the host system...
DPDK: five vulnerabilities via Vhost Crypto
An attacker, inside a guest system, can use several vulnerabilities via Vhost Crypto of DPDK sur le système hôte...
Go: Cross Site Scripting via CGI/FCGI handlers
An attacker can trigger a Cross Site Scripting via CGI/FCGI handlers of Go, in order to run JavaScript code in the context of the web site...
Bluetooth Firmware: memory corruption via Sweyntooth/Spectra
An attacker can trigger a memory corruption via Sweyntooth/Spectra of Bluetooth Firmware, in order to trigger a denial of service, and possibly to run code...
Linux kernel: overload via Zero Length Bvec
An attacker can trigger an overload via Zero Length Bvec of the Linux kernel, in order to trigger a denial of service...
Linux kernel: privilege escalation via net/nfc/rawsock.c
An attacker can bypass restrictions via net/nfc/rawsock.c of the Linux kernel, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via REST API Reflected Input
An attacker can bypass restrictions via REST API Reflected Input of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via CLI Secccrypptocfg
An attacker can bypass restrictions via CLI Secccrypptocfg of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: buffer overflow via REST API
An attacker can trigger a buffer overflow via REST API of Brocade FabricOS, in order to trigger a denial of service, and possibly to run code...
Brocade FabricOS: privilege escalation via CLI Shell Variables
An attacker can bypass restrictions via CLI Shell Variables of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Seccryptocfg Templates
An attacker can bypass restrictions via Seccryptocfg Templates of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Firmware Download Password
An attacker can bypass restrictions via Firmware Download Password of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Supportlink CLI Password Field
An attacker can bypass restrictions via Supportlink CLI Password Field of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Host Header Injection
An attacker can bypass restrictions via Host Header Injection of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: denial of service via Management Interface
An attacker can trigger a fatal error via Management Interface of Brocade FabricOS, in order to trigger a denial of service...
Brocade FabricOS: Cross Site Scripting via HTTP Management Interface
An attacker can trigger a Cross Site Scripting via HTTP Management Interface of Brocade FabricOS, in order to run JavaScript code in the context of the web site...
Yaws: code execution via CGI
An attacker can use a vulnerability via CGI of Yaws, in order to run code...
Yaws: external XML entity injection via WebDAV
An attacker can transmit malicious XML data via WebDAV to Yaws, in order to read a file, scan sites, or trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1072 1074 1075 1076 1077 1078 1079 1080 1081 1082 1101 1116