The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Chrome: buffer overflow via V8
An attacker can trigger a buffer overflow via V8 of Chrome, in order to trigger a denial of service, and possibly to run code...
QEMU: use after free via mptsas_free_request
An attacker, inside a guest system, can force the usage of a freed memory area via mptsas_free_request() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
QEMU: out-of-bounds memory reading via ARM Generic Interrupt Controller
An attacker, inside a guest system, can force a read at an invalid address via ARM Generic Interrupt Controller of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
Linux kernel: privilege escalation via AF_VSOCK
An attacker can bypass restrictions via AF_VSOCK of the Linux kernel, in order to escalate his privileges...
Micro Focus Application Performance Management: two vulnerabilities
An attacker can use several vulnerabilities of Micro Focus Application Performance Management...
Monitorix: privilege escalation via Basic Authentication Bypass
An attacker can bypass restrictions via Basic Authentication Bypass of Monitorix, in order to escalate his privileges...
PHP: NULL pointer dereference via SoapClient
An attacker can force a NULL pointer to be dereferenced via SoapClient of PHP, in order to trigger a denial of service...
VxWorks: integer overflow via calloc
An attacker can trigger an integer overflow via calloc of VxWorks, in order to trigger a denial of service, and possibly to run code...
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
Centreon Web: privilege escalation via centreon_token Evaluation
An attacker can bypass restrictions via centreon_token Evaluation of Centreon Web, in order to escalate his privileges...
Cisco UCS Central Software: privilege escalation via Certificate Registration Process
An attacker can bypass restrictions via Certificate Registration Process of Cisco UCS Central Software, in order to escalate his privileges...
Cisco IOS XR: denial of service via IPv6 Flood
An attacker can trigger a fatal error via IPv6 Flood of Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: privilege escalation via SNMP ACL Bypass
An attacker can bypass restrictions via SNMP ACL Bypass of Cisco IOS XR, in order to escalate his privileges...
Cisco IOS XR/NX-OS: privilege escalation via IPv6 ACL Bypass
An attacker can bypass restrictions via IPv6 ACL Bypass of Cisco IOS XR or NX-OS, in order to escalate his privileges...
Cisco IOS XR: privilege escalation via Image Verification
An attacker can bypass restrictions via Image Verification of Cisco IOS XR, in order to escalate his privileges...
Cisco IOS XR: privilege escalation via Command Line Arguments
An attacker can bypass restrictions via Command Line Arguments of Cisco IOS XR, in order to escalate his privileges...
Cisco IOS XR: denial of service via Enf Broker
An attacker can trigger a fatal error via Enf Broker of Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: information disclosure via CLI Parser
An attacker can bypass access restrictions to data via CLI Parser of Cisco IOS XR, in order to obtain sensitive information...
Open Build Service: file reading
A local attacker can read a file of Open Build Service, in order to obtain sensitive information...
Open Build Service: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Open Build Service, in order to run JavaScript code in the context of the web site...
Nessus AMI: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Nessus AMI, in order to read or write data in the session...
UCOPIA Express: three vulnerabilities
An attacker can use several vulnerabilities of UCOPIA Express...
IBM QRadar SIEM: denial of service via Particular Payloads
An attacker can trigger a fatal error via Particular Payloads of IBM QRadar SIEM, in order to trigger a denial of service...
Chrome: six vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Apport: three vulnerabilities
An attacker can use several vulnerabilities of Apport...
CUPS: out-of-bounds memory reading via Extension Field
An attacker can force a read at an invalid address via Extension Field of CUPS, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1097 1098 1099 1100 1101 1102 1103 1104 1105 1107 1109 1110 1111 1112 1113 1114