The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Synergy: denial of service via KMsgHelloBack Client Name Length
An attacker can trigger a fatal error via KMsgHelloBack Client Name Length of Synergy, in order to trigger a denial of service...
Synology File Station: file reading
A local attacker can read a file of Synology File Station, in order to obtain sensitive information...
Keycloak: privilege escalation via Account REST API
An attacker can bypass restrictions via Account REST API of Keycloak, in order to escalate his privileges...
Red Hat Single Sign-On: privilege escalation via redhat-sso-7
An attacker can bypass restrictions via redhat-sso-7 of Red Hat Single Sign-On, in order to escalate his privileges...
Audacity: file corruption via /var/tmp/audacity-USER
A local attacker can create a symbolic link named /var/tmp/audacity-USER, in order to alter the pointed file, with privileges of Audacity...
HCL Notes: buffer overflow via MIME Message
An attacker can trigger a buffer overflow via MIME Message of HCL Notes, in order to trigger a denial of service, and possibly to run code...
HCL Domino: buffer overflow via MIME Message
An attacker can trigger a buffer overflow via MIME Message of HCL Domino, in order to trigger a denial of service, and possibly to run code...
Mozilla Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird...
Xen: NULL pointer dereference via FIFO Event Channels Structure
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via FIFO Event Channels Structure of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via FIFO Event Channels Block
An attacker, inside a guest system, can trigger a fatal error via FIFO Event Channels of Xen, in order to trigger a denial of service on the host system...
Xen: overload via IRQ Vectors
An attacker, inside a guest system, can trigger an overload via IRQ Vectors of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via XAPI Memory Usage
An attacker, inside a guest system, can trigger a fatal error via XAPI Memory Usage of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Oxenstored Root Node
An attacker, inside a guest system, can bypass restrictions via Oxenstored Root Node of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via oxenstored ownership
An attacker, inside a guest system, can bypass restrictions via oxenstored of Xen, in order to escalate his privileges on the host system...
Xen: use after free via Block Frontend
An attacker, inside a guest system, can force the usage of a freed memory area via Block Frontend of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: denial of service via Watched Path Update
An attacker, inside a guest system, can trigger a fatal error via Watched Path Update of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via X86 HVM Context Switch Recursion
An attacker, inside a guest system, can trigger a fatal error via X86 HVM Context Switch Recursion of Xen, in order to trigger a denial of service on the host system...
Xen: memory leak via XS_RESET_WATCHES
An attacker, inside a guest system, can create a memory leak via XS_RESET_WATCHES of Xen, in order to trigger a denial of service on the host system...
Xen: information disclosure via Xenstored Watch Notifications
An attacker, inside a guest system, can bypass access restrictions to data via Xenstored Watch Notifications of Xen, in order to obtain sensitive information on the host system...
Xen: denial of service via Xenstored Domain Cleanup
An attacker, inside a guest system, can trigger a fatal error via Xenstored Domain Cleanup of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via Xenstored Watchs
An attacker, inside a guest system, can trigger a fatal error via Xenstored Watchs of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via Path Length Check
An attacker, inside a guest system, can trigger a fatal error via Path Length Check of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Node Permissions Inherit
An attacker, inside a guest system, can bypass restrictions via Node Permissions Inherit of Xen, in order to escalate his privileges on the host system...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS 12: code execution
An attacker can use a vulnerability of Apple iOS 12, in order to run code...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Ignite Openfire: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Ignite Openfire, in order to run JavaScript code in the context of the web site...
p11-kit: three vulnerabilities
An attacker can use several vulnerabilities of p11-kit...
MediaWiki: spoofing via FileImporter Extension
An attacker can create spoofed data via FileImporter Extension of MediaWiki, in order to deceive the victim...
MediaWiki: Cross Site Scripting via MobileFrontend Extension
An attacker can trigger a Cross Site Scripting via MobileFrontend Extension of MediaWiki, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1085 1086 1087 1088 1089 1090 1091 1092 1093 1095 1097 1098 1099 1100 1101 1102 1103 1104