The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenEXR: six vulnerabilities
An attacker can use several vulnerabilities of OpenEXR...
Centreon Web: privilege escalation via API Realtime Rights
An attacker can bypass restrictions via API Realtime Rights of Centreon Web, in order to escalate his privileges...
Eclipse Jetty: three vulnerabilities
An attacker can use several vulnerabilities of Eclipse Jetty...
Trend Micro OfficeScan: four vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan...
Apache XmlGraphics Commons: Cross Site Request Forgery via XMPParser
An attacker can trigger a Cross Site Request Forgery via XMPParser of Apache XmlGraphics Commons, in order to force the victim to perform operations...
linux-firmware: vulnerability
A vulnerability of linux-firmware was announced...
underscore: code execution via Template Function
An attacker can use a vulnerability via Template Function of underscore, in order to run code...
leptonlib: four vulnerabilities
An attacker can use several vulnerabilities of leptonlib...
Kaspersky Anti-Virus: four vulnerabilities
An attacker can use several vulnerabilities of Kaspersky Anti-Virus...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Linux kernel: denial of service via Netfilter Memory Barriers
An attacker can trigger a fatal error via Netfilter Memory Barriers of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via UMD copy_process
An attacker can create a memory leak via UMD copy_process() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: denial of service via Vmlinux BTF
An attacker can trigger a fatal error via Vmlinux BTF of the Linux kernel, in order to trigger a denial of service...
Linux kernel: information disclosure via qrtr_recvmsg
A local attacker can read a memory fragment via qrtr_recvmsg() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: buffer overflow via tipc_nl_retrieve_key
An attacker can trigger a buffer overflow via tipc_nl_retrieve_key() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: integer overflow via ext4_es_cache_extent
An attacker can trigger an integer overflow via ext4_es_cache_extent() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Ansible Community Package: information disclosure via Logged Secret Values
An attacker can bypass access restrictions to data via Logged Secret Values of Ansible Community Package, in order to obtain sensitive information...
libcurl: Man-in-the-Middle via TLS 1.3 Session Ticket Proxy Host Mixup
An attacker can act as a Man-in-the-Middle via TLS 1.3 Session Ticket Proxy Host Mixup on libcurl, in order to read or write data in the session...
libcurl: information disclosure via Auto Referer Header Credentials
An attacker can bypass access restrictions to data via Auto Referer Header Credentials of libcurl, in order to obtain sensitive information...
Zabbix: information disclosure via Unsalted Password
An attacker can bypass access restrictions to data via Unsalted Password of Zabbix, in order to obtain sensitive information...
rpm: spoofing via Signature Checks Bypass
An attacker can create spoofed data via Signature Checks Bypass of rpm, in order to deceive the victim...
rpm: out-of-bounds memory reading via hdrblobInit
An attacker can force a read at an invalid address via hdrblobInit() of rpm, in order to trigger a denial of service, or to obtain sensitive information...
Apache PDFBox: overload via Infinite Loop
An attacker can trigger an overload via Infinite Loop of Apache PDFBox, in order to trigger a denial of service...
Apache PDFBox: denial of service via OutOfMemory
An attacker can trigger a fatal error via OutOfMemory of Apache PDFBox, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114 1115 1116 1117 1118 1119 1120 1121 1122 1124 1126