The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Raptor RDF Syntax Library: buffer overflow via raptor_xml_writer_start_element_common
An attacker can trigger a buffer overflow via raptor_xml_writer_start_element_common() of Raptor RDF Syntax Library, in order to trigger a denial of service, and possibly to run code...
MIT krb5: denial of service via asn1_encode.c
An attacker can trigger a fatal error via asn1_encode.c of MIT krb5, in order to trigger a denial of service...
Apache Guacamole: memory corruption via RDP Server Static Virtual Channels
An attacker can trigger a memory corruption via RDP Server Static Virtual Channels of Apache Guacamole, in order to trigger a denial of service, and possibly to run code...
Asterisk: overload via Challenge Different Nonce INVITE
An attacker can trigger an overload via Challenge Different Nonce INVITE of Asterisk, in order to trigger a denial of service...
Asterisk: denial of service via res_pjsip_session
An attacker can trigger a fatal error via res_pjsip_session of Asterisk, in order to trigger a denial of service...
Apple macOS: three vulnerabilities
An attacker can use several vulnerabilities of Apple macOS Catalina...
Apple iOS 14: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS 14...
Apple iOS 12: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS 12...
Fedora pngcheck: security improvement via PIC/PIE
The security of Fedora pngcheck was improved via PIC/PIE...
ImageMagick: denial of service via OptimizeLayerFrames
An attacker can trigger a fatal error via OptimizeLayerFrames() of ImageMagick, in order to trigger a denial of service...
Das U-Boot: use after free via do_rename_gpt_parts
An attacker can force the usage of a freed memory area via do_rename_gpt_parts() of Das U-Boot, in order to trigger a denial of service, and possibly to run code...
SDDM: privilege escalation via X Server Connection
An attacker can bypass restrictions via X Server Connection of SDDM, in order to escalate his privileges...
tcpdump: denial of service via PPP Decapsulator
An attacker can trigger a fatal error via PPP Decapsulator of tcpdump, in order to trigger a denial of service...
tcpdump: denial of service via tok2strbuf
An attacker can trigger a fatal error via tok2strbuf() of tcpdump, in order to trigger a denial of service...
phpMyAdmin: code execution via CSV injection
An attacker can use a vulnerability via CSV injection of phpMyAdmin, in order to run code...
TrouSerS: denial of service via Symlink
An attacker can trigger a fatal error via Symlink of TrouSerS, in order to trigger a denial of service...
TrouSerS: information disclosure via /etc/tcsd.conf
An attacker can bypass access restrictions to data via /etc/tcsd.conf of TrouSerS, in order to obtain sensitive information...
TrouSerS: privilege escalation via Tcsd Daemon
An attacker can bypass restrictions via Tcsd Daemon of TrouSerS, in order to escalate his privileges...
arpwatch: buffer overflow via Long DNS Name
An attacker can trigger a buffer overflow via Long DNS Name of arpwatch, in order to trigger a denial of service, and possibly to run code...
Keycloak: privilege escalation via View-profile Role
An attacker can bypass restrictions via View-profile Role of Keycloak, in order to escalate his privileges...
Keycloak: Cross Site Scripting via redirect_uri
An attacker can trigger a Cross Site Scripting via redirect_uri of Keycloak, in order to run JavaScript code in the context of the web site...
Linux kernel: use after free via sunkbd_reinit
An attacker can force the usage of a freed memory area via sunkbd_reinit() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
IBM QRadar SIEM: information disclosure via Multi Tenant Configuration
An attacker can bypass access restrictions to data via Multi Tenant Configuration of IBM QRadar SIEM, in order to obtain sensitive information...
Cisco SD-WAN vEdge: denial of service via CLI File Creation
An attacker can trigger a fatal error via CLI File Creation of Cisco SD-WAN vEdge, in order to trigger a denial of service...
Cisco IP Phone: denial of service via TCP Packet Flood
An attacker can trigger a fatal error via TCP Packet Flood of Cisco IP Phone, in order to trigger a denial of service...
Cisco SD-WAN vEdge: privilege escalation via Command Options
An attacker can bypass restrictions via Command Options of Cisco SD-WAN vEdge, in order to escalate his privileges...
Cisco SD-WAN vEdge: privilege escalation via CLI Utility
An attacker can bypass restrictions via CLI Utility of Cisco SD-WAN vEdge, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1075 1076 1077 1078 1079 1080 1081 1082 1083 1085 1087 1088 1089