The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: memory leak via eepro100.c
A privileged attacker, inside a guest system, can create a memory leak via eepro100.c of QEMU, in order to trigger a denial of service on the host system...
Linux kernel: integer overflow via VFIO_DEVICE_SET_IRQS
An attacker can generate an integer overflow via VFIO_DEVICE_SET_IRQS on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Docker Engine: privilege escalation via Ambient Capability
An attacker can bypass restrictions via Ambient Capability of Docker Engine, in order to escalate his privileges...
Apache Tomcat: five vulnerabilities
An attacker can use several vulnerabilities of Apache Tomcat...
HPE Business Service Management: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HPE Business Service Management, in order to run JavaScript code in the context of the web site...
Drupal Tripal BLAST UI: code execution
An attacker can use a vulnerability of Drupal Tripal BLAST UI, in order to run code...
Cisco ESA, WSA: denial of service via JAR
An attacker can generate a fatal error via JAR on Cisco ESA or WSA, in order to trigger a denial of service...
Cisco ESA, WSA: bypassing via MIME
An attacker can send a malformed MIME header, in order to bypass the filter of Cisco ESA and WSA...
Cisco ESA, WSA: bypassing via MIME
An attacker can send a malformed MIME header, in order to bypass the filter of Cisco ESA and WSA...
Cisco Email Security Appliance: denial of service via FTP
An attacker can generate a fatal error via FTP of Cisco Email Security Appliance, in order to trigger a denial of service...
Cisco Email Security Appliance: bypassing Drop Filter
An attacker can send a malformed attachment, in order to bypass the Drop Filter of Cisco Email Security Appliance...
Cisco Email Security Appliance: Cross Site Scripting via MIQ
An attacker can trigger a Cross Site Scripting via MIQ of Cisco Email Security Appliance, in order to run JavaScript code in the context of the web site...
Cisco Email Security Appliance: denial of service via Attachment
An attacker can generate a fatal error via Attachment of Cisco Email Security Appliance, in order to trigger a denial of service...
Cisco Email Security Appliance: denial of service via AMP
An attacker can generate a fatal error via AMP of Cisco Email Security Appliance, in order to trigger a denial of service...
Cisco Email Security Appliance: denial of service via DGN
An attacker can generate a fatal error via DGN of Cisco Email Security Appliance, in order to trigger a denial of service...
sssd: privilege escalation
An attacker can bypass restrictions of sssd, in order to escalate his privileges...
Adobe Flash Player: use after free
An attacker can force the usage of a freed memory area of Adobe Flash Player, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: three vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
GraphicsMagick: two vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
GraphicsMagick: multiple vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
GraphicsMagick: out-of-bounds memory reading via SGI
An attacker can force a read at an invalid address via SGI of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: buffer overflow via BMP
An attacker can generate a buffer overflow via BMP of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: three vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
Potrace: multiple vulnerabilities
An attacker can use several vulnerabilities of Potrace...
LibTIFF: memory corruption via BadFaxLines
An attacker can generate a memory corruption via BadFaxLines of LibTIFF, in order to trigger a denial of service, and possibly to run code...
LibTIFF: buffer overflow via Tiff2PDF
An attacker can generate a buffer overflow via Tiff2PDF of LibTIFF, in order to trigger a denial of service, and possibly to run code...
LibTIFF: buffer overflow via PixarLogDecode
An attacker can generate a buffer overflow via PixarLogDecode of LibTIFF, in order to trigger a denial of service, and possibly to run code...
tcpdump: infinite loop via RSVP
An attacker can generate an infinite loop via RSVP of tcpdump, in order to trigger a denial of service...
Perl Image-Info: external XML entity injection
An attacker can transmit malicious XML data to Perl Image::Info, in order to read a file, scan sites, or trigger a denial of service...
FreeBSD: privilege escalation via bhyve
An attacker, inside a guest system, can corrupt the memory via bhyve of FreeBSD, in order to escalate his privileges on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 646 647 648 649 650 651 652 653 654 656 658 659 660 661 662 663 664 665 666 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102