The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
OpenVPN: Man-in-the-Middle via NTLM Authentication
An attacker can act as a Man-in-the-Middle via NTLM Authentication on OpenVPN, in order to read or write data in the session...
OpenVPN: denial of service via IPv6
An attacker can send malicious IPv6 packets to OpenVPN, in order to trigger a denial of service...
WordPress All-in-One WP Migration: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress All-in-One WP Migration, in order to run JavaScript code in the context of the web site...
WordPress Event Calendar WD: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Event Calendar WD, in order to run JavaScript code in the context of the web site...
IBM WebSphere Application Server Liberty: information disclosure via Exceptions
An attacker can bypass access restrictions to data via Exceptions of IBM WebSphere Application Server Liberty, in order to obtain sensitive information...
SIMATIC CP 44x-1 RNA: privilege escalation
An attacker can bypass restrictions of SIMATIC CP 44x-1 RNA, in order to escalate his privileges...
Lifesize Icon: security improvement
The security of Lifesize Icon was improved...
FreeBSD: denial of service via qsort
An attacker can generate a fatal error via qsort() of FreeBSD, in order to trigger a denial of service...
NetBSD: denial of service via qsort
An attacker can generate a fatal error via qsort() of NetBSD, in order to trigger a denial of service...
OpenBSD: denial of service via qsort
An attacker can generate a fatal error via qsort() of OpenBSD, in order to trigger a denial of service...
IBM System x Server: information disclosure via IMM2 FFDC Logs
An attacker can bypass access restrictions to data via IMM2 FFDC Logs of IBM System x Server, in order to obtain sensitive information...
Xen: denial of service via ARM Vgic SGI
An attacker, inside a guest system, can generate a fatal error via ARM Vgic SGI of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Grant Table Operations
An attacker, inside a guest system, can bypass restrictions via Grant Table Operations of Xen, in order to escalate his privileges on the host system...
Xen: denial of service via ARM Guest Disabling Interrupt
An attacker, inside a guest system, can generate a fatal error via ARM Guest Disabling Interrupt of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Stale P2M Mappings
An attacker, inside a guest system, can bypass restrictions via Stale P2M Mappings of Xen, in order to escalate his privileges on the host system...
Xen: NULL pointer dereference via Event Channel Poll
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via Event Channel Poll of Xen, in order to trigger a denial of service on the host system...
Xen: information disclosure via PKRU/BND
An attacker, inside a guest system, can bypass access restrictions to data via PKRU/BND of Xen, in order to obtain sensitive information on the host system...
Xen: privilege escalation via Shadow Emulation
An attacker, inside a guest system, can bypass restrictions via Shadow Emulation of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Grant Table Unmap
An attacker, inside a guest system, can bypass restrictions via Grant Table Unmap of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Page Transfer
An attacker, inside a guest system, can bypass restrictions via Page Transfer of Xen, in order to escalate his privileges on the host system...
Xen: information disclosure via Block Interface Response
A local attacker, inside a guest system, can read a memory fragment via Block Interface Response of Xen, in order to obtain sensitive information on the host system...
Linux kernel: use after free via regulator_ena_gpio_free
An attacker can force the usage of a freed memory area via regulator_ena_gpio_free() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
libffi: privilege escalation via Executable Stack
An attacker can bypass restrictions via Executable Stack of libffi, in order to escalate his privileges...
Open vSwitch: integer overflow via ofputil_pull_queue_get_config_reply10
An attacker can generate an integer overflow via ofputil_pull_queue_get_config_reply10() of Open vSwitch, in order to trigger a denial of service, and possibly to run code...
Open vSwitch: out-of-bounds memory reading via Malformed Packets
An attacker can force a read at an invalid address via Malformed Packets of Open vSwitch, in order to trigger a denial of service, or to obtain sensitive information...
Solaris /usr/bin/rsh: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of Solaris /usr/bin/rsh, in order to trigger a denial of service, and possibly to run code...
FreeBSD: memory corruption via Stack Clash
An attacker can generate a memory corruption via Stack Clash of FreeBSD, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 715 716 717 718 719 720 721 722 723 725 727 728 729 730 731 732 733 734 735 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021