The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: memory corruption via uvc_scan_chain_forward
An attacker can trigger a memory corruption via uvc_scan_chain_forward() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Podman: information disclosure via Varlink API / Docker-compatible REST API
An attacker can bypass access restrictions to data via Varlink API / Docker-compatible REST API of Podman, in order to obtain sensitive information...
WEBrick: information disclosure via Transfer-Encoding Header Smuggling
An attacker can bypass access restrictions to data via Transfer-Encoding Header Smuggling of WEBrick, in order to obtain sensitive information...
PHP: information disclosure via __Host- Cookie Names
An attacker can bypass access restrictions to data via __Host- Cookie Names of PHP, in order to obtain sensitive information...
PHP: information disclosure via AES-CCM Encryption
An attacker can bypass access restrictions to data via AES-CCM Encryption of PHP, in order to obtain sensitive information...
Ruby json-jwt: buffer overflow via JWE String Splitting
An attacker can trigger a buffer overflow via JWE String Splitting of Ruby json-jwt, in order to trigger a denial of service, and possibly to run code...
FortiOS: buffer overflow via HTTPD
An attacker can trigger a buffer overflow via HTTPD of FortiOS, in order to trigger a denial of service, and possibly to run code...
Node.js node-forge: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js node-forge, in order to escalate his privileges...
Webmin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Webmin, in order to run JavaScript code in the context of the web site...
WebSphere AS: information disclosure via Serialized Objects
An attacker can bypass access restrictions to data via Serialized Objects of WebSphere AS, in order to obtain sensitive information...
Ansible Tower: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Ansible Tower, in order to run JavaScript code in the context of the web site...
unoconv: information disclosure via Pathnames
An attacker can bypass access restrictions to data via Pathnames of unoconv, in order to obtain sensitive information...
libsrtp: buffer overflow via crypto_policy_set_from_profile_for_rtp
An attacker can trigger a buffer overflow via crypto_policy_set_from_profile_for_rtp() of libsrtp, in order to trigger a denial of service, and possibly to run code...
ipa: overload via Very Long Password
An attacker can trigger an overload via Very Long Password of ipa, in order to trigger a denial of service...
Bootstrap: Cross Site Scripting via Tooltip Data-container Property
An attacker can trigger a Cross Site Scripting via Tooltip Data-container Property of Bootstrap, in order to run JavaScript code in the context of the web site...
libvpx: denial of service
An attacker can trigger a fatal error of libvpx, in order to trigger a denial of service...
Linux kernel: memory corruption via nf_conntrack_h323
An attacker can trigger a memory corruption via nf_conntrack_h323 of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
RHEL Kernel: buffer overflow via NFS Client Direct IO Write
An attacker can trigger a buffer overflow via NFS Client Direct IO Write of RHEL Kernel, in order to trigger a denial of service, and possibly to run code...
WebSphere AS: information disclosure via Specialized Access
An attacker can bypass access restrictions to data via Specialized Access of WebSphere AS, in order to obtain sensitive information...
SPIP: code execution
An attacker can use a vulnerability of SPIP, in order to run code...
Brotli: buffer overflow via One Shot Decompression Request
An attacker can trigger a buffer overflow via One Shot Decompression Request of Brotli, in order to trigger a denial of service, and possibly to run code...
QEMU: NULL pointer dereference via ide_cancel_dma_sync
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via ide_cancel_dma_sync() of QEMU, in order to trigger a denial of service on the host system...
QEMU: NULL pointer dereference via pci_change_irq_level
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via pci_change_irq_level() of QEMU, in order to trigger a denial of service on the host system...
QEMU: NULL pointer dereference via fdctrl_read_data/fdctrl_write_data
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via fdctrl_read_data/fdctrl_write_data() of QEMU, in order to trigger a denial of service on the host system...
DPDK: five vulnerabilities via Vhost Crypto
An attacker, inside a guest system, can use several vulnerabilities via Vhost Crypto of DPDK sur le système hôte...
Go: Cross Site Scripting via CGI/FCGI handlers
An attacker can trigger a Cross Site Scripting via CGI/FCGI handlers of Go, in order to run JavaScript code in the context of the web site...
Bluetooth Firmware: memory corruption via Sweyntooth/Spectra
An attacker can trigger a memory corruption via Sweyntooth/Spectra of Bluetooth Firmware, in order to trigger a denial of service, and possibly to run code...
Linux kernel: overload via Zero Length Bvec
An attacker can trigger an overload via Zero Length Bvec of the Linux kernel, in order to trigger a denial of service...
Linux kernel: privilege escalation via net/nfc/rawsock.c
An attacker can bypass restrictions via net/nfc/rawsock.c of the Linux kernel, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via REST API Reflected Input
An attacker can bypass restrictions via REST API Reflected Input of Brocade FabricOS, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1063 1064 1065 1066 1067 1068 1069 1070 1071 1073 1075 1076 1077 1078 1079 1080 1081 1082