The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: NULL pointer dereference via spk_ttyio_receive_buf2
An attacker can force a NULL pointer to be dereferenced via spk_ttyio_receive_buf2() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via serial8250_start_tx
An attacker can force a NULL pointer to be dereferenced via serial8250_start_tx() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: use after free via blkdev_get
An attacker can force the usage of a freed memory area via blkdev_get of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
ReadyMedia/MiniDLNA: integer overflow via UPnP HTTP Chunked Encoding
An attacker can trigger an integer overflow via UPnP HTTP Chunked Encoding of ReadyMedia/MiniDLNA, in order to trigger a denial of service, and possibly to run code...
Node.js chart.js: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js chart.js, in order to escalate his privileges...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Snapcraft: code execution via Current Directory Path Search
An attacker can use a vulnerability via Current Directory Path Search of Snapcraft, in order to run code...
Apache Tomcat: information disclosure via HTTP/2 Request Header Mix-up
An attacker can bypass access restrictions to data via HTTP/2 Request Header Mix-up of Apache Tomcat, in order to obtain sensitive information...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
rpmlint: security improvement
The security of rpmlint was improved...
Linux kernel: read-write access via io_uring
An attacker can bypass access restrictions via io_uring of the Linux kernel, in order to read or alter data...
Unbound: denial of service via PID File Symlink
An attacker can trigger a fatal error via PID File Symlink of Unbound, in order to trigger a denial of service...
Check Point Endpoint Security Client for Window: vulnerability
A vulnerability of Check Point Endpoint Security Client for Window was announced...
Thunderbird: buffer overflow via SMTP Server Response Codes
An attacker can trigger a buffer overflow via SMTP Server Response Codes of Thunderbird, in order to trigger a denial of service, and possibly to run code...
Perl Convert-ASN1: overload
An attacker can trigger an overload of Perl Convert::ASN1, in order to trigger a denial of service...
HCL Notes: buffer overflow via DXL
An attacker can trigger a buffer overflow via DXL of HCL Notes, in order to trigger a denial of service, and possibly to run code...
HCL Domino: buffer overflow via DXL
An attacker can trigger a buffer overflow via DXL of HCL Domino, in order to trigger a denial of service, and possibly to run code...
FreeBSD: code execution via rtsold
An attacker can use a vulnerability via rtsold of FreeBSD, in order to run code...
FreeBSD: use after free via ICMPv6
An attacker can force the usage of a freed memory area via ICMPv6 of FreeBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD 12.2: privilege escalation via ipfw Uninitialized Variable
An attacker can bypass restrictions via ipfw Uninitialized Variable of FreeBSD 12.2, in order to escalate his privileges...
Linux kernel: use after free via drivers/android/binder.c
An attacker can force the usage of a freed memory area via drivers/android/binder.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
FortiGate: Cross Site Scripting via Log/Report Section
An attacker can trigger a Cross Site Scripting via Log/Report Section of FortiGate, in order to run JavaScript code in the context of the web site...
FortiClient/FortiOS: privilege escalation via RAR AV Engine Evasion
An attacker can bypass restrictions via RAR AV Engine Evasion of FortiClient/FortiOS, in order to escalate his privileges...
Pallets Werkzeug: open redirect via Double Slash
An attacker can deceive the user via Double Slash of Pallets Werkzeug, in order to redirect him to a malicious site...
Node.js Ajv: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js Ajv, in order to escalate his privileges...
Node.js y18n: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js y18n, in order to escalate his privileges...
X.Org Server: buffer overflow via XkbSetDeviceInfo
An attacker can trigger a buffer overflow via XkbSetDeviceInfo of X.Org Server, in order to trigger a denial of service, and possibly to run code...
X.Org Server: out-of-bounds memory reading via XkbSetMap
An attacker can force a read at an invalid address via XkbSetMap of X.Org Server, in order to trigger a denial of service, or to obtain sensitive information...
Ibexa DXP: information disclosure via Setup System Info
An attacker can bypass access restrictions to data via Setup System Info of Ibexa DXP, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1092 1094 1095 1096 1097 1098 1099 1100 1101 1102 1104