The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenSSH: privilege escalation via LogVerbose Low-privilege Sandboxed Escape
An attacker can bypass restrictions via LogVerbose Low-privilege Sandboxed Escape of OpenSSH, in order to escalate his privileges...
Ruby REXML: spoofing via XML Round-trip
An attacker can create spoofed data via XML Round-trip of Ruby REXML, in order to deceive the victim...
GNU Chess: buffer overflow via Portable Game Notation
An attacker can trigger a buffer overflow via Portable Game Notation of GNU Chess, in order to trigger a denial of service, and possibly to run code...
Apache Batik: information disclosure via NodePickerPanel SSRF
An attacker can bypass access restrictions to data via NodePickerPanel SSRF of Apache Batik, in order to obtain sensitive information...
QEMU: multiple vulnerabilities via am53c974 ESP Device Emulation
An attacker, inside a guest system, can use several vulnerabilities via am53c974 ESP Device Emulation of QEMU sur le système hôte...
LibreOffice: code execution via Windows Filename Extensions Denylist Bypass
An attacker can use a vulnerability via Filename Extensions Denylist Bypass of LibreOffice, in order to run code...
Apache OpenOffice: code execution via Special Hyperlinks
An attacker can use a vulnerability via Special Hyperlinks of Apache OpenOffice, in order to run code...
McAfee Endpoint Security: information disclosure via Cleartext Transmission
An attacker can bypass access restrictions to data via Cleartext Transmission of McAfee Endpoint Security, in order to obtain sensitive information...
Ubuntu: read-write access via overlayfs File System
An attacker can bypass access restrictions via overlayfs File System of Ubuntu, in order to read or alter data...
Ubuntu: memory corruption via shiftfs File System
An attacker can trigger a memory corruption via shiftfs File System of Ubuntu, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory leak via kvm_io_bus_unregister_dev
An attacker can create a memory leak via kvm_io_bus_unregister_dev() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: overload via set_memory_region_test
An attacker can trigger an overload via set_memory_region_test() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: denial of service via n_tty_receive_char_special
An attacker can trigger a fatal error via n_tty_receive_char_special() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: denial of service via Large SEV VM Destruction
An attacker can trigger a fatal error via Large SEV VM Destruction of the Linux kernel, in order to trigger a denial of service...
IBM Spectrum Protect Server: buffer overflow via Command Parameter
An attacker can trigger a buffer overflow via Command Parameter of IBM Spectrum Protect Server, in order to trigger a denial of service, and possibly to run code...
Kubernetes kube-apiserver: privilege escalation via Admission Webhook
An attacker can bypass restrictions via Admission Webhook of Kubernetes kube-apiserver, in order to escalate his privileges...
WordPress Core: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Linux kernel: denial of service via make_bad_inode
An attacker can trigger a fatal error via make_bad_inode() of the Linux kernel, in order to trigger a denial of service...
FluidSynth: use after free via sfloader/fluid_sffile.c
An attacker can force the usage of a freed memory area via sfloader/fluid_sffile.c of FluidSynth, in order to trigger a denial of service, and possibly to run code...
PAN-OS: information disclosure via Scheduled Configuration Exports Logged Secrets
An attacker can bypass access restrictions to data via Scheduled Configuration Exports Logged Secrets of PAN-OS, in order to obtain sensitive information...
PAN-OS: information disclosure via XML API Logged Secrets
An attacker can bypass access restrictions to data via XML API Logged Secrets of PAN-OS, in order to obtain sensitive information...
Ceph: privilege escalation via Global Identifier Reuse
An attacker can bypass restrictions via Global Identifier Reuse of Ceph, in order to escalate his privileges...
NetworkManager: denial of service via Certain Profiles
An attacker can trigger a fatal error via Certain Profiles of NetworkManager, in order to trigger a denial of service...
Junos OS: multiple vulnerabilities
An attacker can use several vulnerabilities of Junos OS...
Wind River VxWorks: buffer overflow via DHCP Server
An attacker can trigger a buffer overflow via DHCP Server of Wind River VxWorks, in order to trigger a denial of service, and possibly to run code...
Wind River VxWorks: buffer overflow via DHCP Client
An attacker can trigger a buffer overflow via DHCP Client of Wind River VxWorks, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1117 1118 1119 1120 1121 1122 1123 1124 1125 1127 1129 1130 1131 1132 1133