The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: use after free via vhost_vdpa_get_vring_num
An attacker can force the usage of a freed memory area via vhost_vdpa_get_vring_num() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via gianfar.c
An attacker can trigger a fatal error via gianfar.c of the Linux kernel, in order to trigger a denial of service...
RESTEasy: information disclosure via JAX-RS Resource Method Parameter Conversion
An attacker can bypass access restrictions to data via JAX-RS Resource Method Parameter Conversion of RESTEasy, in order to obtain sensitive information...
Linux kernel: out-of-bounds memory reading via dm-ioctl.c
An attacker can force a read at an invalid address via dm-ioctl.c of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Apple iOS: Cross Site Scripting via WebKit
An attacker can trigger a Cross Site Scripting via WebKit of Apple iOS, in order to run JavaScript code in the context of the web site...
CGAL: four vulnerabilities
An attacker can use several vulnerabilities of CGAL...
Apache SpamAssassin: code execution via Rule Configuration Files
An attacker can use a vulnerability via Rule Configuration Files of Apache SpamAssassin, in order to run code...
WebKitGTK: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
ArcGIS Desktop/Pro: three vulnerabilities via Malicious File
An attacker can use several vulnerabilities via Malicious File of ArcGIS Desktop/Pro...
ArcGIS Server: three vulnerabilities via Malicious File
An attacker can use several vulnerabilities via Malicious File of ArcGIS Server...
HPE ProLiant: information disclosure via iLO Serial Number
An attacker can bypass access restrictions to data via iLO Serial Number of HPE ProLiant, in order to obtain sensitive information...
McAfee ePolicy Orchestrator: three vulnerabilities
An attacker can use several vulnerabilities of McAfee ePolicy Orchestrator...
Dell Unisphere for PowerMax: privilege escalation via Monitor Role
An attacker can bypass restrictions via Monitor Role of Dell Unisphere for PowerMax, in order to escalate his privileges...
ClusterLabs Hawk: read-write access via chmod
An attacker can bypass access restrictions via chmod() of ClusterLabs Hawk, in order to read or alter data...
OpenSSL: NULL pointer dereference via signature_algorithms
An attacker can force a NULL pointer to be dereferenced via signature_algorithms of OpenSSL, in order to trigger a denial of service...
OpenSSL: Man-in-the-Middle via X509_V_FLAG_X509_STRICT
An attacker can act as a Man-in-the-Middle via X509_V_FLAG_X509_STRICT on OpenSSL, in order to read or write data in the session...
lxml: Cross Site Scripting via HTML5 Formaction Attribute
An attacker can trigger a Cross Site Scripting via HTML5 Formaction Attribute of lxml, in order to run JavaScript code in the context of the web site...
Cisco IOS, IOS XE: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco IOS and IOS XE...
Cisco Aironet: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco Aironet...
Intel Ethernet I210 Controller: denial of service
An attacker can trigger a fatal error of Intel Ethernet I210 Controller, in order to trigger a denial of service...
WebSphere AS ND: Cross Site Scripting via High Availability Deployment Manager
An attacker can trigger a Cross Site Scripting via High Availability Deployment Manager of WebSphere AS ND, in order to run JavaScript code in the context of the web site...
libass: integer overflow via ass_outline_construct
An attacker can trigger an integer overflow via ass_outline_construct() of libass, in order to trigger a denial of service, and possibly to run code...
GnuTLS: use after free via client_send_params
An attacker can force the usage of a freed memory area via client_send_params of GnuTLS, in order to trigger a denial of service, and possibly to run code...
GnuTLS: use after free via key_share
An attacker can force the usage of a freed memory area via key_share of GnuTLS, in order to trigger a denial of service, and possibly to run code...
Go: denial of service via Reader.Open
An attacker can trigger a fatal error via Reader.Open of Go, in order to trigger a denial of service...
Go: overload via NewTokenDecoder
An attacker can trigger an overload via NewTokenDecoder of Go, in order to trigger a denial of service...
Samba: out-of-bounds memory reading via AD DC LDAP Server
An attacker can force a read at an invalid address via AD DC LDAP Server of Samba, in order to trigger a denial of service, or to obtain sensitive information...
Samba: memory corruption via DN Strings
An attacker can trigger a memory corruption via DN Strings of Samba, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1112 1113 1114 1115 1116 1117 1118 1119 1120 1122 1124 1125