The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
dosfstools: memory corruption
An attacker can generate a memory corruption of dosfstools, in order to trigger a denial of service, and possibly to run code...
wpa_supplicant: two vulnerabilities
An attacker can use several vulnerabilities of wpa_supplicant...
Jansson: denial of service
An attacker can generate a fatal error of Jansson, in order to trigger a denial of service...
KSBA: two vulnerabilities
An attacker can use several vulnerabilities of KSBA...
Jackson Data format: external XML entity injection via XmlMapper
An attacker can transmit malicious XML data via XmlMapper to Jackson Data format, in order to read a file, scan sites, or trigger a denial of service...
OpenVPN: denial of service via port-share
An attacker can generate a fatal error in port-share of OpenVPN, in order to trigger a denial of service...
Botan: Man-in-the-Middle of TLS Policy
An attacker can act as a Man-in-the-Middle bypassing the TLS Policy on Botan, in order to read or write data in the session...
Owncloud: multiple vulnerabilities
An attacker can use several vulnerabilities of Owncloud...
ioprocess: security improvement
The security of ioprocess was improved...
VMware Player, Workstation: privilege escalation
An attacker on a Windows host system can use VMware Player or Workstation, in order to escalate his privileges...
VMware vCenter: code execution via JMX Deserialization
An attacker can send authentication data containing a malicious object, which is unserialized by JMX on VMware vCenter, in order to run code...
Linux kernel RT: denial of service via Ping SysRq
An attacker can send a Ping packet to use a SysRq command on the Linux kernel with the RT patch, in order to trigger a denial of service...
Linux kernel: memory corruption via KVM MSR 0x2F8
An attacker located in a KVM guest system can generate a memory corruption via MSR 0x2F8 on the Linux kernel, in order to trigger a denial of service, and possibly to run code on the host system...
RUGGEDCOM ROS: Man-in-the-Middle of WebUI
An attacker can act as a Man-in-the-Middle of WebUI on RUGGEDCOM ROS, in order to read or write data in the session...
Docker: privilege escalation via Numeric UID
A local attacker can in some cases use an uid on Docker, in order to escalate his privileges...
glibc: denial of service via getaddrinfo
An attacker can generate a fatal error in getaddrinfo of glibc, in order to trigger a denial of service...
Pulse Connect Secure: seven vulnerabilities
An attacker can use several vulnerabilities of Pulse Connect Secure...
7-Zip: two vulnerabilities
An attacker can use several vulnerabilities of 7-Zip...
Google Chrome: five vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
ArubaOS: memory corruption via Broadcom Wi-Fi
An attacker can generate a memory corruption in Broadcom Wi-Fi of ArubaOS, in order to trigger a denial of service, and possibly to run code...
ArubaOS: out-of-bounds memory reading
An attacker can force a read at an invalid address of ArubaOS, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: use after free via pcpu_extend_area_map
An attacker can force the usage of a freed memory area in pcpu_extend_area_map() via BPF on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via asn1_find_indefinite_length
An attacker can generate a memory corruption in asn1_find_indefinite_length() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
OCaml: buffer overflow
An attacker can generate a buffer overflow of OCaml, in order to trigger a denial of service, and possibly to run code...
WordPress Pondol Carousel: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Pondol Carousel, in order to run JavaScript code in the context of the web site...
WordPress Tera Charts: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Tera Charts, in order to run JavaScript code in the context of the web site...
WordPress CM Tooltip Glossary: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress CM Tooltip Glossary, in order to run JavaScript code in the context of the web site...
Linux kernel: use after free via ppp_unregister_channel
An attacker can force the usage of a freed memory area in ppp_unregister_channel() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via propagate_one
An attacker can force a NULL pointer to be dereferenced in propagate_one() on the Linux kernel, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 602 603 604 605 606 607 608 609 611 613 614 615 616 617 618 619 620 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1105