The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Linux kernel: information disclosure via crng_ready
An attacker can bypass access restrictions to data via crng_ready() of the Linux kernel, in order to obtain sensitive information...
2 Linux kernel: out-of-bounds memory reading via Keyring Subsystem
An attacker can force a read at an invalid address via Keyring Subsystem of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
3 OCaml: integer overflow via caml_ba_deserialize
An attacker can generate an integer overflow via caml_ba_deserialize() of OCaml, in order to trigger a denial of service, and possibly to run code...
3 Salt: code execution via ssh_client
An attacker can use a vulnerability via ssh_client of Salt, in order to run code...
2 Salt: information disclosure via Deleted Minions Id
An attacker can bypass access restrictions to data via Deleted Minions Id of Salt, in order to obtain sensitive information...
1 PackageKit: privilege escalation via Install Packages Polkit Rule
An attacker can bypass restrictions via Install Packages Polkit Rule of PackageKit, in order to escalate his privileges...
2 IBM Spectrum Scale: information disclosure via Dump Files
An attacker can bypass access restrictions to data via Dump Files of IBM Spectrum Scale, in order to obtain sensitive information...
2 LibTIFF: NULL pointer dereference via jpeg_fdct_16x16
An attacker can force a NULL pointer to be dereferenced via jpeg_fdct_16x16() of LibTIFF, in order to trigger a denial of service...
2 Nextcloud Server: privilege escalation via User-Controlled Key
An attacker can bypass restrictions via User-Controlled Key of Nextcloud Server, in order to escalate his privileges...
2 mbed TLS: out-of-bounds memory reading via ssl_parse_server_psk_hint
An attacker can force a read at an invalid address via ssl_parse_server_psk_hint() of mbed TLS, in order to trigger a denial of service, or to obtain sensitive information...
2 mbed TLS: out-of-bounds memory reading via ssl_parse_server_key_exchange
An attacker can force a read at an invalid address via ssl_parse_server_key_exchange() of mbed TLS, in order to trigger a denial of service, or to obtain sensitive information...
2 cfitsio: multiple vulnerabilities
An attacker can use several vulnerabilities of cfitsio...
3 OpenBSD: memory leak via Httpd Range Requests
An attacker can create a memory leak via Httpd Range Requests of OpenBSD, in order to trigger a denial of service...
3 OpenBSD 6.3: use after free via IPv6 GIF Interface
An attacker can force the usage of a freed memory area via IPv6 GIF Interface of OpenBSD 6.3, in order to trigger a denial of service, and possibly to run code...
3 Nghttp2: NULL pointer dereference via ALTSVC Frame
An attacker can force a NULL pointer to be dereferenced via ALTSVC Frame of Nghttp2, in order to trigger a denial of service...
2 RoundCube Webmail: privilege escalation via IMAP Injection
An attacker can bypass restrictions via IMAP Injection of RoundCube Webmail, in order to escalate his privileges...
3 SDL2: memory corruption via XCF Image
An attacker can generate a memory corruption via XCF Image of SDL2, in order to trigger a denial of service, and possibly to run code...
2 SDL2: information disclosure via XCF Image
An attacker can bypass access restrictions to data via XCF Image of SDL2, in order to obtain sensitive information...
2 SDL2: information disclosure via PCX Image
An attacker can bypass access restrictions to data via PCX Image of SDL2, in order to obtain sensitive information...
3 HAProxy: memory corruption via HTTP/2
An attacker can generate a memory corruption via HTTP/2 of HAProxy, in order to trigger a denial of service, and possibly to run code...
2 Linux kernel: denial of service via arch_timer_reg_read_stable
An attacker can generate a fatal error via arch_timer_reg_read_stable() of the Linux kernel, in order to trigger a denial of service...
3 Cisco ASA Firepower: denial of service via SSL Packet Reassembly
An attacker can generate a fatal error via SSL Packet Reassembly of Cisco ASA Firepower, in order to trigger a denial of service...
2 phpMyAdmin: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of phpMyAdmin, in order to force the victim to perform operations...
2 WordPress CalderaForms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress CalderaForms, in order to run JavaScript code in the context of the web site...
2 Joomla JS Jobs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla JS Jobs, in order to run JavaScript code in the context of the web site...
2 Drupal Display Suite: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Display Suite, in order to run JavaScript code in the context of the web site...
3 Drupal Menu Import and Export: privilege escalation
An attacker can bypass restrictions of Drupal Menu Import and Export, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 812 813 814 815 816 817 818 819 820 822 824 825 826 827 828 829 830 831 832 841 861 881 901 921 941 961 981 996