The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle VM VirtualBox: vulnerabilities of January 2021
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of January 2021
Several vulnerabilities were announced in Oracle products...
Oracle Java: privilege escalation via Sandbox Escape
An attacker can bypass restrictions via Sandbox Escape of Oracle Java, in order to escalate his privileges...
Oracle Fusion Middleware: vulnerabilities of January 2021
Several vulnerabilities were announced in Oracle products...
Oracle Database: vulnerabilities of January 2021
Several vulnerabilities were announced in Oracle products...
Python: buffer overflow via ctypes PyCArg_repr
An attacker can trigger a buffer overflow via ctypes PyCArg_repr() of Python, in order to trigger a denial of service, and possibly to run code...
Dnsmasq: multiple vulnerabilities
An attacker can use several vulnerabilities of Dnsmasq...
VLC Media Player: multiple vulnerabilities
An attacker can use several vulnerabilities of VLC Media Player...
Gstreamer: buffer overflow via H264
An attacker can trigger a buffer overflow via H264 of Gstreamer, in order to trigger a denial of service, and possibly to run code...
OpenLDAP: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenLDAP...
Pillow: multiple vulnerabilities
An attacker can use several vulnerabilities of Pillow...
QEMU: out-of-bounds memory reading via ide_atapi_cmd_reply_end
An attacker, inside a guest system, can force a read at an invalid address via ide_atapi_cmd_reply_end() of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
glibc: out-of-bounds memory reading via Iconv EUC-KR Encoding
An attacker can force a read at an invalid address via Iconv EUC-KR Encoding of glibc, in order to trigger a denial of service, or to obtain sensitive information...
CairoSVG: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of CairoSVG, in order to trigger a denial of service...
ImageMagick: multiple vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: four vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
Redcarpet: Cross Site Scripting via Quotes
An attacker can trigger a Cross Site Scripting via Quotes of Redcarpet, in order to run JavaScript code in the context of the web site...
DELL EMC Avamar Server: three vulnerabilities
An attacker can use several vulnerabilities of DELL EMC Avamar Server...
Linux kernel: NULL pointer dereference via DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC
An attacker can force a NULL pointer to be dereferenced via DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC of the Linux kernel, in order to trigger a denial of service...
Elasticsearch: information disclosure via Async Search API
An attacker can bypass access restrictions to data via Async Search API of Elasticsearch, in order to obtain sensitive information...
Flatpak: privilege escalation via Sandbox Escape
An attacker, inside a guest system, can bypass restrictions via Sandbox Escape of Flatpak, in order to escalate his privileges on the host system...
Open-iSCSI: multiple vulnerabilities
An attacker can use several vulnerabilities of Open-iSCSI...
Apache Tomcat: information disclosure via NTFS JSP Source Code
An attacker can bypass access restrictions to data via NTFS JSP Source Code of Apache Tomcat, in order to obtain sensitive information...
CPU-X: security improvement
The security of CPU-X was improved...
AdPlug: buffer overflow via CradLoader-load
An attacker can trigger a buffer overflow via CradLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via Ca2mLoader-load
An attacker can trigger a buffer overflow via Ca2mLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CmtkLoader-load
An attacker can trigger a buffer overflow via CmtkLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CdtmLoader-load
An attacker can trigger a buffer overflow via CdtmLoader::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1093 1094 1095 1096 1097 1098 1099 1100 1101 1103 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114