The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: buffer overflow via ati_2d_blt
An attacker, inside a guest system, can trigger a buffer overflow via ati_2d_blt() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
KDE Connect: denial of service via Packet Manipulation
An attacker can trigger a fatal error via Packet Manipulation of KDE Connect, in order to trigger a denial of service...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Linux kernel: out-of-bounds memory reading via ppp_cp_parse_cr
An attacker can force a read at an invalid address via ppp_cp_parse_cr() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
TigerVNC: read-write access via Certificates Stored As Authorities
An attacker can bypass access restrictions via Certificates Stored As Authorities of TigerVNC, in order to read or alter data...
GitHub Flavored Markdown: overload via Input Parsing
An attacker can trigger an overload via Input Parsing of GitHub Flavored Markdown, in order to trigger a denial of service...
SPICE: buffer overflow via QUIC Decoding Code
An attacker can trigger a buffer overflow via QUIC Decoding Code of SPICE, in order to trigger a denial of service, and possibly to run code...
Python: code execution via CJK Codec Tests eval
An attacker can use a vulnerability via CJK Codec Tests eval() of Python, in order to run code...
Google Android: multiple vulnerabilities of October 2020
An attacker can use several vulnerabilities of Google Android...
Dell EMC OpenManage Integration for Microsoft System Center: code execution
An attacker can use a vulnerability of Dell EMC OpenManage Integration for Microsoft System Center, in order to run code...
Ansible Base: denial of service via SSM Connection Plugin
An attacker can trigger a fatal error via SSM Connection Plugin of Ansible Base, in order to trigger a denial of service...
Ansible Base: information disclosure via SSM Connection Plugin
An attacker can bypass access restrictions to data via SSM Connection Plugin of Ansible Base, in order to obtain sensitive information...
OpenBSD: denial of service via PROT_NONE MAP_SHARED
An attacker can trigger a fatal error via PROT_NONE MAP_SHARED of OpenBSD, in order to trigger a denial of service...
libproxy: buffer overflow via PAC File
An attacker can trigger a buffer overflow via PAC File of libproxy, in order to trigger a denial of service, and possibly to run code...
urllib3: information disclosure via CRLF Injection
An attacker can bypass access restrictions to data via CRLF Injection of urllib3, in order to obtain sensitive information...
Perl DBI: memory corruption via User-defined Function
An attacker can trigger a memory corruption via User-defined Function of Perl DBI, in order to trigger a denial of service, and possibly to run code...
MongoDB Server: denial of service via GeoQuery
An attacker can trigger a fatal error via GeoQuery of MongoDB Server, in order to trigger a denial of service...
Node.js socket.io-file: file upload
An attacker can upload a malicious file on Node.js socket.io-file, in order for example to upload a Trojan...
Node.js yargs-parser: read-write access via Prototype Pollution
An attacker can bypass access restrictions via Prototype Pollution of Node.js yargs-parser, in order to read or alter data...
Linux kernel: privilege escalation via Secure Boot Forbidden Signature Bypass
An attacker can bypass restrictions via Secure Boot Forbidden Signature Bypass of the Linux kernel, in order to escalate his privileges...
WebKit: four vulnerabilities
An attacker can use several vulnerabilities of WebKit...
SNMPTT: code execution via EXEC
An attacker can use a vulnerability via EXEC of SNMPTT, in order to run code...
libvirt: use after free via qemuAgentGetInterfaces
An attacker can force the usage of a freed memory area via qemuAgentGetInterfaces() of libvirt, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via romfs_dev_read
A local attacker can read a memory fragment via romfs_dev_read() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: buffer overflow via skb_to_mamac
An attacker can trigger a buffer overflow via skb_to_mamac() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via kbd_keycode
An attacker can trigger a buffer overflow via kbd_keycode of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: out-of-bounds memory reading via create_pinctrl
An attacker can force a read at an invalid address via create_pinctrl of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1064 1065 1066 1067 1068 1069 1070 1071 1072 1074 1076 1077 1078 1079 1080 1081 1082