The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WildFly: memory leak via Host Controller Connect Loop
An attacker can create a memory leak via Host Controller Connect Loop of WildFly, in order to trigger a denial of service...
CodeMirror: denial of service via Regular Expression
An attacker can trigger a fatal error via Regular Expression of CodeMirror, in order to trigger a denial of service...
Oracle WebLogic Server: code execution via Console
An attacker can use a vulnerability of Oracle WebLogic Server, in order to run code...
Linux kernel: denial of service via llcp_sock_connect
An attacker can trigger a fatal error via llcp_sock_connect() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via llcp_sock_connect
An attacker can create a memory leak via llcp_sock_connect() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: assertion error via llcp_sock_connect
An attacker can force an assertion error via llcp_sock_connect() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: assertion error via llcp_sock_bind
An attacker can force an assertion error via llcp_sock_bind() of the Linux kernel, in order to trigger a denial of service...
Windows: privilege escalation via cng.sys
An attacker can bypass restrictions via cng.sys of Windows, in order to escalate his privileges...
JUnit4: information disclosure via TemporaryFolder
An attacker can bypass access restrictions to data via TemporaryFolder of JUnit4, in order to obtain sensitive information...
OpenLDAP: NULL pointer dereference via modrdn
An attacker can force a NULL pointer to be dereferenced via modrdn of OpenLDAP, in order to trigger a denial of service...
Linux kernel: use after free via con_font_op
An attacker can force the usage of a freed memory area via con_font_op() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Wireshark: two vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Nessus: privilege escalation
An attacker can bypass restrictions of Nessus, in order to escalate his privileges...
WordPress Core: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Lout: buffer overflow via srcnext
An attacker can trigger a buffer overflow via srcnext() of Lout, in order to trigger a denial of service, and possibly to run code...
Lout: buffer overflow via StringQuotedWord
An attacker can trigger a buffer overflow via StringQuotedWord() of Lout, in order to trigger a denial of service, and possibly to run code...
tmux: buffer overflow via input_csi_dispatch_sgr_colon
An attacker can trigger a buffer overflow via input_csi_dispatch_sgr_colon() of tmux, in order to trigger a denial of service, and possibly to run code...
Check Point Endpoint Security Client for Windows: vulnerability
A vulnerability of Check Point Endpoint Security Client for Windows was announced...
Check Point Security Management: privilege escalation via Internal CA Web Management
An attacker can bypass restrictions via Internal CA Web Management of Check Point Security Management, in order to escalate his privileges...
DOMPurify: Cross Site Scripting via Serialize Parse Roundtrip
An attacker can trigger a Cross Site Scripting via Serialize Parse Roundtrip of DOMPurify, in order to run JavaScript code in the context of the web site...
DOMPurify: Cross Site Scripting via InnerHTML Mutation
An attacker can trigger a Cross Site Scripting via InnerHTML Mutation of DOMPurify, in order to run JavaScript code in the context of the web site...
Pagure: Cross Site Scripting via templates/blame.html
An attacker can trigger a Cross Site Scripting via templates/blame.html of Pagure, in order to run JavaScript code in the context of the web site...
Tensorflow: multiple vulnerabilities
An attacker can use several vulnerabilities of Tensorflow...
Linux kernel: overload via KVM Ioapic Lazy EOI
An attacker can trigger an overload via KVM Ioapic Lazy EOI of the Linux kernel, in order to trigger a denial of service...
Samba: three vulnerabilities
An attacker can use several vulnerabilities of Samba...
yubihsm-shell: buffer overflow via _send_secure_msg
An attacker can trigger a buffer overflow via _send_secure_msg() of yubihsm-shell, in order to trigger a denial of service, and possibly to run code...
yubihsm-shell: buffer overflow via yh_create_session
An attacker can trigger a buffer overflow via yh_create_session() of yubihsm-shell, in order to trigger a denial of service, and possibly to run code...
tcpreplay: buffer overflow via get_l2len
An attacker can trigger a buffer overflow via get_l2len() of tcpreplay, in order to trigger a denial of service, and possibly to run code...
tcpreplay: buffer overflow via MemcmpInterceptorCommon
An attacker can trigger a buffer overflow via MemcmpInterceptorCommon() of tcpreplay, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1072 1073 1074 1075 1076 1077 1078 1079 1080 1082 1084 1085 1086 1087 1088 1089