The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Pydantic: overload via Infinite Date
An attacker can trigger an overload via Infinite Date of Pydantic, in order to trigger a denial of service...
Keycloak: privilege escalation via Backchannel Logout
An attacker can bypass restrictions via Backchannel Logout of Keycloak, in order to escalate his privileges...
Keycloak: privilege escalation via IDN Homograph
An attacker can bypass restrictions via IDN Homograph of Keycloak, in order to escalate his privileges...
libass: buffer overflow via parse_tag
An attacker can trigger a buffer overflow via parse_tag() of libass, in order to trigger a denial of service, and possibly to run code...
Bouncy Castle Java Cryptography Extension: information disclosure via ECC GCD Based Inversion Side-channel
An attacker can bypass access restrictions to data via ECC GCD Based Inversion Side-channel of Bouncy Castle Java Cryptography Extension, in order to obtain sensitive information...
Pillow: six vulnerabilities
An attacker can use several vulnerabilities of Pillow...
Xen: information disclosure via Bare 32-bit PV Guests
An attacker, inside a guest system, can bypass access restrictions to data via Bare 32-bit PV Guests of Xen, in order to obtain sensitive information on the host system...
Python httplib2: overload via Www-authenticate A0
An attacker can trigger an overload via Www-authenticate A0 of Python httplib2, in order to trigger a denial of service...
Cisco Prime Infrastructure: code execution via HTTP Request Command Injection
An attacker can use a vulnerability via HTTP Request Command Injection of Cisco Prime Infrastructure, in order to run code...
Cisco Unified CCX: Cross Site Scripting via Finesse
An attacker can trigger a Cross Site Scripting via Finesse of Cisco Unified CCX, in order to run JavaScript code in the context of the web site...
Cisco Unified CCX: open redirect via Finesse
An attacker can deceive the user via Finesse of Cisco Unified CCX, in order to redirect him to a malicious site...
Cisco Prime Infrastructure: read-write access via CLI ADE-OS Local File Inclusion
An attacker can bypass access restrictions via CLI ADE-OS Local File Inclusion of Cisco Prime Infrastructure, in order to read or alter data...
runc: privilege escalation via symlink-exchange
An attacker can bypass restrictions via symlink-exchange of runc, in order to escalate his privileges...
pip: privilege escalation via Unicode Separators Different Revision
An attacker can bypass restrictions via Unicode Separators Different Revision of pip, in order to escalate his privileges...
HPE ProLiant: multiple vulnerabilities
An attacker can use several vulnerabilities of HPE ProLiant...
slapi-nis: NULL pointer dereference via Binding DN
An attacker can force a NULL pointer to be dereferenced via Binding DN of slapi-nis, in order to trigger a denial of service...
Podman: information disclosure via Rootless Containers Localhost Traffic
An attacker can bypass access restrictions to data via Rootless Containers Localhost Traffic of Podman, in order to obtain sensitive information...
Rust: use after free via VecDeque-make_contiguous
An attacker can force the usage of a freed memory area via VecDeque::make_contiguous() of Rust, in order to trigger a denial of service, and possibly to run code...
Rust: assertion error via String-retain
An attacker can force an assertion error via String::retain() of Rust, in order to trigger a denial of service...
GNU Bash: privilege escalation via disable_priv_mode
An attacker can bypass restrictions via disable_priv_mode() of GNU Bash, in order to escalate his privileges...
GhostScript: use after free via igc_reloc_struct_ptr
An attacker can force the usage of a freed memory area via igc_reloc_struct_ptr() of GhostScript, in order to trigger a denial of service, and possibly to run code...
SPICE: denial of service via Client-initiated Renegotiation
An attacker can trigger a fatal error via Client-initiated Renegotiation of SPICE, in order to trigger a denial of service...
glibc: overload via Iconv Multiple Suffixes
An attacker can trigger an overload via Iconv Multiple Suffixes of glibc, in order to trigger a denial of service...
Raptor RDF Syntax Library: buffer overflow via raptor_xml_writer_start_element_common
An attacker can trigger a buffer overflow via raptor_xml_writer_start_element_common() of Raptor RDF Syntax Library, in order to trigger a denial of service, and possibly to run code...
Grafana: Cross Site Scripting via Series Alias
An attacker can trigger a Cross Site Scripting via Series Alias of Grafana, in order to run JavaScript code in the context of the web site...
systemd: privilege escalation via Numerical Usernames
An attacker can bypass restrictions via Numerical Usernames of systemd, in order to escalate his privileges...
exif: NULL pointer dereference via XML Formatted Printing
An attacker can force a NULL pointer to be dereferenced via XML Formatted Printing of exif, in order to trigger a denial of service...
LibreOffice: code execution via MacOS Fileloc Extension
An attacker can use a vulnerability via MacOS Fileloc Extension of LibreOffice, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1131 1132 1133 1134 1135 1136 1137 1138 1139 1141 1143 1144 1145 1146 1147 1148 1149 1150