The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js fury-adapter-swagger: directory traversal
An attacker can traverse directories of Node.js fury-adapter-swagger, in order to read a file outside the service root path...
Tenable Nessus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Tenable Nessus, in order to run JavaScript code in the context of the web site...
QEMU: memory leak via VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING
An attacker, inside a guest system, can create a memory leak via an ioctl system call with the command VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING targeting the Virtio GPU driver of QEMU, in order to trigger a denial of service on the host system...
Mozilla Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox...
WordPress moreAds SE: open redirect
An attacker can deceive the user of WordPress moreAds SE, in order to redirect him to a malicious site...
gd: two vulnerabilities
An attacker can use several vulnerabilities of gd...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Hesiod: two vulnerabilities
An attacker can use several vulnerabilities of Hesiod...
LibTIFF: buffer overflow via LZWEncode tif_lzw.c
An attacker can generate a buffer overflow via LZWEncode tif_lzw.c of LibTIFF, in order to trigger a denial of service, and possibly to run code...
Wireshark: two vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
phpMyAdmin: seven vulnerabilities
An attacker can use several vulnerabilities of phpMyAdmin...
Percona XtraBackup: information disclosure via Xbcrypt Encryption IV
An attacker can bypass access restrictions to data via Xbcrypt Encryption IV of Percona XtraBackup, in order to obtain sensitive information...
QEMU: memory leak via virtio-gpu-3d
An attacker, inside a guest system, can create a memory leak via the driver virtio-gpu-3d of QEMU, in order to trigger a denial of service on the host system...
QEMU: memory leak via wdt_i6300esb
An attacker, inside a guest system, can create a memory leak via the driver of the watchdog device wdt_i6300esb of QEMU, in order to trigger a denial of service on the host system...
NetBSD: memory leak via connect
A local attacker can create a memory leak via the connect() system call of NetBSD, in order to trigger a denial of service...
Linux kernel: integer overflow via VC4_SUBMIT_CL IOCTL
An attacker can generate an integer overflow via the command VC4_SUBMIT_CL of the VideoCore DRM driver of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Check Point Security Gateway: vulnerability
A vulnerability of Check Point Security Gateway was announced...
Linux kernel: privilege escalation via tmpfs S_ISGID
An attacker can bypass restrictions via tmpfs S_ISGID on the Linux kernel, in order to escalate his privileges...
Linux kernel: information disclosure via iov_iter.c
A local attacker can read a memory fragment via iov_iter.c on the Linux kernel, in order to obtain sensitive information...
Linux kernel: memory corruption via kl5kusb105.c
An attacker can generate a memory corruption via kl5kusb105.c on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
WebKitGTK+: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK+...
Linux kernel: memory corruption via ieee802154/atusb.c
An attacker can generate a memory corruption via ieee802154/atusb.c on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via CONFIG_VMAP_STACK and smbencrypt.c
An attacker can generate a memory corruption via CONFIG_VMAP_STACK and smbencrypt.c on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via CONFIG_VMAP_STACK and ceph/crypto.c
An attacker can generate a memory corruption via CONFIG_VMAP_STACK and ceph/crypto.c on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: memory corruption via CONFIG_VMAP_STACK and hid-corsair.c
An attacker can generate a memory corruption via CONFIG_VMAP_STACK and hid-corsair.c on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
libnl3: privilege escalation via nla_reserve
An attacker can bypass restrictions via nla_reserve() of libnl3, in order to escalate his privileges...
Linux kernel: use after free via CONFIG_SLAB_FREELIST_RANDOM
An attacker can force the usage of a freed memory area via CONFIG_SLAB_FREELIST_RANDOM on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
ed: use after free
An attacker can force the usage of a freed memory area of ed, in order to trigger a denial of service, and possibly to run code...
Apache Groovy: code execution
An attacker can use a vulnerability of Apache Groovy, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 669 670 671 672 673 674 675 676 677 679 681 682 683 684 685 686 687 688 689 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1059