The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Simple SCEP: security improvement via RPM_OPT/LD_FLAGS
The security of Simple SCEP was improved via RPM_OPT/LD_FLAGS...
SQLite: information disclosure via Pointer Disclosure
An attacker can bypass access restrictions to data via Pointer Disclosure of SQLite, in order to obtain sensitive information...
Xen: information disclosure via GTF_writing/reading
An attacker, inside a guest system, can bypass access restrictions to data via GTF_writing/reading of Xen, in order to obtain sensitive information on the host system...
Xen: privilege escalation via Block IO Merge
An attacker, inside a guest system, can bypass restrictions via Block IO Merge of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via grant_table
An attacker, inside a guest system, can bypass restrictions via grant_table of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via map_grant_ref
An attacker, inside a guest system, can bypass restrictions via map_grant_ref of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Transitive Grants
An attacker, inside a guest system, can bypass restrictions via Transitive Grants of Xen, in order to escalate his privileges on the host system...
idtech3: denial of service
An attacker can send malicious packets to idtech3, in order to trigger a denial of service...
libgd2: information disclosure via gdImageCreateFromGifCtx
An attacker can bypass access restrictions to data via gdImageCreateFromGifCtx() of libgd2, in order to obtain sensitive information...
libgxps: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of libgxps, in order to trigger a denial of service...
Mozilla NSS: four vulnerabilities
An attacker can use several vulnerabilities of Mozilla NSS...
CVS: code execution via ssh
An attacker can use a vulnerability via ssh of CVS, in order to run code...
Linux kernel: memory corruption via UFO
An attacker can generate a memory corruption via UFO of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via AF_PACKET
An attacker can generate a buffer overflow via AF_PACKET of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Horde: Cross Site Scripting via selfUrl
An attacker can trigger a Cross Site Scripting via selfUrl() of Horde, in order to run JavaScript code in the context of the web site...
Knot DNS Resolver: vulnerability
A vulnerability of Knot DNS Resolver was announced...
xchat: directory traversal
An attacker can traverse directories of xchat, in order to read a file outside the service root path...
Mercurial: code execution via ssh
An attacker can use a vulnerability via ssh of Mercurial, in order to run code...
Git: code execution via ssh
An attacker can use a vulnerability via ssh of Git, in order to run code...
Apache Subversion Client: code execution via svn+ssh
An attacker can use a vulnerability via svn+ssh of the Apache Subversion client, in order to run code...
Apache Tomcat: directory traversal via HTTP/2
An attacker can traverse directories via HTTP/2 of Apache Tomcat, in order to read a file outside the service root path...
Apache Tomcat: information disclosure via Cache Poisoning
An attacker can bypass access restrictions to data via Cache Poisoning of Apache Tomcat, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 731 732 733 734 735 736 737 738 739 741 743 744 745 746 747 748 749 750 751 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1069