The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: infinite loop via __get_data_block
An attacker can generate an infinite loop via __get_data_block() of the Linux kernel, in order to trigger a denial of service...
Exempi: NULL pointer dereference via WEBP-VP8XChunk
An attacker can force a NULL pointer to be dereferenced via WEBP::VP8XChunk of Exempi, in order to trigger a denial of service...
Exempi: out-of-bounds memory reading via PostScript_MetaHandler-ParsePSFile
An attacker can force a read at an invalid address via PostScript_MetaHandler::ParsePSFile() of Exempi, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: out-of-bounds memory reading via nl80211_set_station
An attacker can force a read at an invalid address via nl80211_set_station() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Kubernetes: vulnerability via Cluster Autoscaler
A vulnerability via Cluster Autoscaler of Kubernetes was announced...
WordPress: three vulnerabilities
An attacker can use several vulnerabilities of WordPress...
GnuPG: privilege escalation via Key Certification
An attacker can bypass restrictions via Key Certification of GnuPG, in order to escalate his privileges...
libxml2: infinite loop via xz_decomp
An attacker can generate an infinite loop via xz_decomp() of libxml2, in order to trigger a denial of service...
Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
LibRaw: buffer overflow via panasonic_load_raw
An attacker can generate a buffer overflow via panasonic_load_raw() of LibRaw, in order to trigger a denial of service, and possibly to run code...
Sophos Endpoint Protection: privilege escalation via Weak Unsalted Hash
An attacker can bypass restrictions via Weak Unsalted Hash of Sophos Endpoint Protection, in order to escalate his privileges...
Sophos Endpoint Protection: privilege escalation via Enhanced Tamper Protection
An attacker can bypass restrictions via Enhanced Tamper Protection of Sophos Endpoint Protection, in order to escalate his privileges...
Microsoft Malware Protection Engine: memory corruption
An attacker can generate a memory corruption of Microsoft Malware Protection Engine, in order to trigger a denial of service, and possibly to run code...
LDAP Account Manager: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of LDAP Account Manager, in order to force the victim to perform operations...
LDAP Account Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of LDAP Account Manager, in order to run JavaScript code in the context of the web site...
FreeBSD: infinite loop via IPsec Authentication Header
An attacker can generate an infinite loop via IPsec Authentication Header of FreeBSD, in order to trigger a denial of service...
FreeBSD: information disclosure via VT Console
A local attacker can read a memory fragment via VT Console of FreeBSD, in order to obtain sensitive information...
FreeBSD: information disclosure via Memory Leak
A local attacker can read a memory fragment of FreeBSD, in order to obtain sensitive information...
WordPress Relevanssi: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Relevanssi, in order to run JavaScript code in the context of the web site...
Google Android/Pixel: multiple vulnerabilities of April 2018
An attacker can use several vulnerabilities of Google Android/Pixel...
GSKit: vulnerability
A vulnerability of GSKit was announced...
Drupal avatar_uploader: directory traversal
An attacker can traverse directories of Drupal avatar_uploader, in order to read a file outside the service root path...
WordPress File Upload: vulnerability via Shortcode Attributes
A vulnerability via Shortcode Attributes of WordPress File Upload was announced...
IBM QRadar SIEM: information disclosure via Log Files
An attacker can bypass access restrictions to data via Log Files of IBM QRadar SIEM, in order to obtain sensitive information...
IBM QRadar SIEM: read-write access via Security Resource
An attacker can bypass access restrictions via Security Resource of IBM QRadar SIEM, in order to read or alter data...
beep: privilege escalation via Race Condition
An attacker can bypass restrictions via Race Condition of beep, in order to escalate his privileges...
libevt: memory corruption via EVT File
An attacker can generate a memory corruption via EVT File of libevt, in order to trigger a denial of service, and possibly to run code...
remctl: use after free
An attacker can force the usage of a freed memory area of remctl, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 806 807 808 809 810 811 812 813 814 816 818 819 820 821 822 823 824 825 826 841 861 881 901 921 941 961 981 1001 1021 1041 1047