The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PDFResurrect: buffer overflow via pdf_get_version
An attacker can trigger a buffer overflow via pdf_get_version() of PDFResurrect, in order to trigger a denial of service, and possibly to run code...
QEMU: overload via e1000e Null Packet Descriptor
An attacker, inside a guest system, can trigger an overload via e1000e Null Packet Descriptor of QEMU, in order to trigger a denial of service on the host system...
containerd: privilege escalation via Shim API Socket
An attacker can bypass restrictions via Shim API Socket of containerd, in order to escalate his privileges...
musl: buffer overflow via wcsnrtombs
An attacker can trigger a buffer overflow via wcsnrtombs() of musl, in order to trigger a denial of service, and possibly to run code...
libvips: information disclosure via im_vips2dz
An attacker can bypass access restrictions to data via im_vips2dz() of libvips, in order to obtain sensitive information...
XStream: code execution via Input Stream
An attacker can use a vulnerability via Input Stream of XStream, in order to run code...
Linux kernel: use after free via snd_rawmidi_kernel_write1
An attacker can force the usage of a freed memory area via snd_rawmidi_kernel_write1() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: out-of-bounds memory reading via dbAdjTree
An attacker can force a read at an invalid address via dbAdjTree() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Ubuntu 20.04: information disclosure via MySQL X Plugin All Interfaces Listening
An attacker can bypass access restrictions to data via MySQL X Plugin All Interfaces Listening of Ubuntu 20.04, in order to obtain sensitive information...
Python: information disclosure via hmac.compare_digest Timing
An attacker can bypass access restrictions to data via hmac.compare_digest Timing of Python, in order to obtain sensitive information...
HCL Domino: privilege escalation via LDAP Lockout Policy Bypass
An attacker can bypass restrictions via LDAP Lockout Policy Bypass of HCL Domino, in order to escalate his privileges...
HCL Domino: privilege escalation via Lockout Policy Bypass
An attacker can bypass restrictions via Lockout Policy Bypass of HCL Domino, in order to escalate his privileges...
HCL Domino: Cross Site Request Forgery via Login
An attacker can trigger a Cross Site Request Forgery via Login of HCL Domino, in order to force the victim to perform operations...
HCL Domino: information disclosure via iNotes Cookie Exposure
An attacker can bypass access restrictions to data via iNotes Cookie Exposure of HCL Domino, in order to obtain sensitive information...
Linux kernel: write access via get_user_pages
An attacker can bypass access restrictions via get_user_pages() of the Linux kernel, in order to alter data...
Linux kernel: information disclosure via io_uring
An attacker can bypass access restrictions to data via io_uring of the Linux kernel, in order to obtain sensitive information...
Linux kernel: memory corruption via __split_huge_pmd
An attacker can trigger a memory corruption via __split_huge_pmd() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via show_numa_stats
An attacker can force the usage of a freed memory area via show_numa_stats() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Eclipse Jetty: privilege escalation via Gzip Request Data Injection
An attacker can bypass restrictions via Gzip Request Data Injection of Eclipse Jetty, in order to escalate his privileges...
Linux-Pam: privilege escalation via Root Empty Password
An attacker can bypass restrictions via Root Empty Password of Linux-Pam, in order to escalate his privileges...
Moodle: six vulnerabilities
An attacker can use several vulnerabilities of Moodle...
x11vnc: read-write access via Shared Memory
An attacker can bypass access restrictions via Shared Memory of x11vnc, in order to read or alter data...
QEMU: assertion error via usb_packet_map
An attacker, inside a guest system, can force an assertion error via usb_packet_map() of QEMU, in order to trigger a denial of service on the host system...
QEMU: out-of-bounds memory reading via ohci_service_td
An attacker, inside a guest system, can force a read at an invalid address via ohci_service_td() of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
QEMU: out-of-bounds memory reading via SLiRP ARP/NCSI Packets
An attacker, inside a guest system, can force a read at an invalid address via SLiRP ARP/NCSI Packets of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
swtpm: vulnerability
A vulnerability of swtpm was announced...
LXML: Cross Site Scripting via escape
An attacker can trigger a Cross Site Scripting via escapes of LXML, in order to run JavaScript code in the context of the web site...
xdg-utils: information disclosure
An attacker can bypass access restrictions to data of xdg-utils, in order to obtain sensitive information...
MS WIndows 7, 2008: privilege escalation via registry permissions
An attacker can make profit of permissive permission on the MS Windows registry, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1082 1083 1084 1085 1086 1087 1088 1089 1091 1093 1094 1095 1096 1097 1098 1099 1100 1101 1104