The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: assertion error via vga_draw_graphic
An attacker, inside a guest system, can force an assertion error via vga_draw_graphic() of QEMU, in order to trigger a denial of service on the host system...
QEMU: denial of service via vga_draw_line
An attacker, inside a guest system, can generate a fatal error via vga_draw_line() of QEMU, in order to trigger a denial of service on the host system...
git-annex: code execution via ssh oProxyCommand
An attacker can use a vulnerability via ssh oProxyCommand of git-annex, in order to run code...
OpenBSD: privilege escalation via Old WPA Keys
An attacker can bypass restrictions via Old WPA Keys of OpenBSD, in order to escalate his privileges...
Drupal H5P: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal H5P, in order to run JavaScript code in the context of the web site...
Drupal Commerce Invoices: two vulnerabilities
An attacker can use several vulnerabilities of Drupal Commerce Invoices...
faad2: multiple vulnerabilities
An attacker can use several vulnerabilities of faad2...
Wireshark: four vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Jasypt: information disclosure via Password Hash Comparison
An attacker can bypass access restrictions to data via Password Hash Comparison of Jasypt, in order to obtain sensitive information...
QEMU: use after free via Slirp
An attacker, inside a guest system, can force the usage of a freed memory area via Slirp of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Libgcrypt: information disclosure via Curve25519 ECDH Side-channel
An attacker can bypass access restrictions to data via Curve25519 ECDH Side-channel of Libgcrypt, in order to obtain sensitive information...
Joomla Twitch Tv: SQL injection
An attacker can use a SQL injection of Joomla Twitch Tv, in order to read or alter data...
Joomla Appointment: SQL injection
An attacker can use a SQL injection of Joomla Appointment, in order to read or alter data...
OpenSSL: out-of-bounds memory reading via X.509 IPAddressFamily
An attacker can force a read at an invalid address via X.509 IPAddressFamily of OpenSSL, in order to trigger a denial of service, or to obtain sensitive information...
MIT krb5: privilege escalation via EKU Cert Missing SAN
An attacker can bypass restrictions via EKU Cert Missing SAN of MIT krb5, in order to escalate his privileges...
FFmpeg: out-of-bounds memory reading via DNxHD
An attacker can force a read at an invalid address via DNxHD of FFmpeg, in order to trigger a denial of service, or to obtain sensitive information...
FFmpeg: denial of service via RTMP Stream
An attacker can generate a fatal error via RTMP Stream of FFmpeg, in order to trigger a denial of service...
FFmpeg: integer overflow via APE Decoder
An attacker can generate an integer overflow via APE Decoder of FFmpeg, in order to trigger a denial of service, and possibly to run code...
FFmpeg: NULL pointer dereference via MOV
An attacker can force a NULL pointer to be dereferenced via MOV of FFmpeg, in order to trigger a denial of service...
gnome-shell: code execution via Lock Screen Extensions
An attacker can use a vulnerability via Lock Screen Extensions of gnome-shell, in order to run code...
Synology DSM: denial of service via SYNO.Core.PortForwarding.Rules
An attacker can generate a fatal error via SYNO.Core.PortForwarding.Rules of Synology DSM, in order to trigger a denial of service...
Pulse Connect Secure: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Pulse Connect Secure, in order to force the victim to perform operations...
Joomla Zap Calendar: SQL injection
An attacker can use a SQL injection of Joomla Zap Calendar, in order to read or alter data...
Linux kernel: information disclosure via acpi_ns_evaluate
An attacker can bypass access restrictions to data via acpi_ns_evaluate() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via acpi_ps_complete_final_op
An attacker can bypass access restrictions to data via acpi_ps_complete_final_op() of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via acpi_ds_create_operands
An attacker can bypass access restrictions to data via acpi_ds_create_operands() of the Linux kernel, in order to obtain sensitive information...
OpenBSD: privilege escalation via SMAP Enforcement
An attacker can bypass restrictions via SMAP Enforcement of OpenBSD, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 735 736 737 738 739 740 741 742 743 745 747 748 749 750 751 752 753 754 755 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050