The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: privilege escalation via waitid
An attacker, inside a guest system, can bypass restrictions via waitid() of the Linux kernel, in order to escalate his privileges on the host system...
QEMU: buffer overflow via Cirrus CLGD 54xx VGA Emulator
An attacker, inside a guest system, can generate a buffer overflow via Cirrus CLGD 54xx VGA Emulator of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Drupal netFORUM: privilege escalation
An attacker can bypass restrictions of Drupal netFORUM, in order to escalate his privileges...
WordPress WPHRM: SQL injection
An attacker can use a SQL injection of WordPress WPHRM, in order to read or alter data...
Xen: privilege escalation via CPU Hotplug IST Settings
An attacker, inside a guest system, can bypass restrictions via CPU Hotplug IST Settings of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Self-linear Shadow Mappings
An attacker, inside a guest system, can bypass restrictions via Self-linear Shadow Mappings of Xen, in order to escalate his privileges on the host system...
Xen: memory leak via Page Type Reference
An attacker, inside a guest system, can create a memory leak via Page Type Reference of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Stale TLB Entry
An attacker, inside a guest system, can bypass restrictions via Stale TLB Entry of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Linear Pagetable De-typing
An attacker, inside a guest system, can bypass restrictions via Linear Pagetable De-typing of Xen, in order to escalate his privileges on the host system...
Xen: information disclosure via X86 I/O Intercept Code
A local attacker, inside a guest system, can read a memory fragment via X86 I/O Intercept Code of Xen, in order to obtain sensitive information on the host system...
Xen: denial of service via DMOP map/unmap
An attacker, inside a guest system, can generate a fatal error via DMOP map/unmap of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via PCI MSI Interrupts
An attacker, inside a guest system, can bypass restrictions via PCI MSI Interrupts of Xen, in order to escalate his privileges on the host system...
Linux kernel: NULL pointer dereference via security/keys/keyctl.c
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via security/keys/keyctl.c of the Linux kernel, in order to trigger a denial of service on the host system...
Linux kernel: buffer overflow via KVM Nested Virtualisation
An attacker, inside a guest system, can generate a buffer overflow via KVM Nested Virtualisation of the Linux kernel, in order to trigger a denial of service, and possibly to run code on the host system...
Citrix XenServer: multiple vulnerabilities
An attacker can use several vulnerabilities of Citrix XenServer...
ArubaOS: three vulnerabilities
An attacker can use several vulnerabilities of ArubaOS...
Linux kernel: buffer overflow via brcmf_cfg80211_escan_handler
An attacker can generate a buffer overflow via brcmf_cfg80211_escan_handler() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
QEMU: memory leak via VNC Websock
An attacker, inside a guest system, can create a memory leak via VNC Websock of QEMU, in order to trigger a denial of service on the host system...
Juniper Junos: multiple vulnerabilities
An attacker can use several vulnerabilities of Juniper Junos...
Linux kernel: NULL pointer dereference via KEYCTL_READ
An attacker can force a NULL pointer to be dereferenced via KEYCTL_READ of the Linux kernel, in order to trigger a denial of service...
Jenkins Swarm Plugin: Man-in-the-Middle via commons-httpclient
An attacker can act as a Man-in-the-Middle via commons-httpclient on Jenkins Swarm Plugin, in order to read or write data in the session...
Jenkins Speaks Plugin: code execution
An attacker can use a vulnerability of Jenkins Speaks Plugin, in order to run code...
Jenkins Maven Plugin: Man-in-the-Middle via commons-httpclient
An attacker can act as a Man-in-the-Middle on Jenkins Maven Plugin, in order to read or write data in the session...
Jenkins Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core...
OpenStack Keystone: privilege escalation via Federation Configurations
An attacker can bypass restrictions via Federation Configurations of OpenStack Keystone, in order to escalate his privileges...
Node.js Modules: directory traversal
An attacker can traverse directories of Node.js modules, in order to read a file outside the service root path...
Joomla Ajax Quiz by Webkul: SQL injection
An attacker can use a SQL injection of Joomla Ajax Quiz by Webkul, in order to read or alter data...
Linux kernel: use after free via /dev/snd/seq
An attacker can force the usage of a freed memory area via /dev/snd/seq of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
WordPress TR Easy Google Analytic: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress TR Easy Google Analytic, in order to run JavaScript code in the context of the web site...
Cacti: Cross Site Scripting via Path-Based
An attacker can trigger a Cross Site Scripting via Path-Based of Cacti, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 751 752 753 754 755 756 757 758 759 761 763 764 765 766 767 768 769 770 771 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1069