The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
3 NetBSD: multiple vulnerabilities via IPsec
An attacker can use several vulnerabilities via IPsec of NetBSD...
3 OpenBSD: denial of service via IPsec
An attacker can send malicious IPsec packets to OpenBSD, in order to trigger a denial of service...
2 FreeBSD: information disclosure via TCP Network Stack
A local attacker can read a memory fragment via TCP Network Stack of FreeBSD, in order to obtain sensitive information...
2 FreeBSD: information disclosure via Atheros
A local attacker can read a memory fragment via Atheros of FreeBSD, in order to obtain sensitive information...
2 DPDK: information disclosure via Guest Physical Ranges
An attacker can bypass access restrictions to data via Guest Physical Ranges of DPDK, in order to obtain sensitive information...
2 389 Directory Server: denial of service via Ldapsearch Large Filter
An attacker can generate a fatal error via Ldapsearch Large Filter of 389 Directory Server, in order to trigger a denial of service...
1 Linux kernel: information disclosure via vhost_new_msg
A local attacker can read a memory fragment via vhost_new_msg( of the Linux kernel, in order to obtain sensitive information...
2 Linux kernel: privilege escalation via KVM DB Exceptions
An attacker, inside a guest system, can bypass restrictions via KVM DB Exceptions of the Linux kernel, in order to escalate his privileges on the host system...
2 Linux kernel: privilege escalation via DB Exceptions
An attacker can bypass restrictions via DB Exceptions of the Linux kernel, in order to escalate his privileges...
2 wget: information disclosure via Cookies Injection
An attacker can bypass access restrictions to data via Cookies Injection of wget, in order to obtain sensitive information...
2 Jenkins Groovy Postbuild: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Jenkins Groovy Postbuild, in order to run JavaScript code in the context of the web site...
2 Jenkins Gitlab Hook: information disclosure via Plain Text API Token
An attacker can bypass access restrictions to data via Plain Text API Token of Jenkins Gitlab Hook, in order to obtain sensitive information...
2 Jenkins Black Duck Hub: two vulnerabilities
An attacker can use several vulnerabilities of Jenkins Black Duck Hub...
2 Jenkins Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core...
2 Xen: infinite loop via Device Model
An attacker, inside a guest system, can generate an infinite loop via Device Model of Xen, in order to trigger a denial of service on the host system...
2 Xen: privilege escalation via vHPET Interrupt Injection
An attacker, inside a guest system, can bypass restrictions via vHPET Interrupt Injection of Xen, in order to escalate his privileges on the host system...
2 Xen: privilege escalation via Debug Exceptions
An attacker, inside a guest system, can bypass restrictions via Debug Exceptions of Xen, in order to escalate his privileges on the host system...
4 Windows: vulnerabilities of May 2018
An attacker can use several vulnerabilities of Microsoft products...
4 Microsoft Exchange: vulnerabilities of May 2018
An attacker can use several vulnerabilities of Microsoft products...
3 Microsoft Office: vulnerabilities of May 2018
An attacker can use several vulnerabilities of Microsoft products...
3 Microsoft .NET: vulnerabilities of May 2018
An attacker can use several vulnerabilities of Microsoft products...
4 Edge, IE: vulnerabilities of May 2018
An attacker can use several vulnerabilities of Microsoft products...
4 Adobe Flash Player: code execution
An attacker can use a vulnerability of Adobe Flash Player, in order to run code...
2 Apache POI: infinite loop via PPT
An attacker can generate an infinite loop via PPT of Apache POI, in order to trigger a denial of service...
2 WordPress Tagregator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Tagregator, in order to run JavaScript code in the context of the web site...
2 kwallet-pam: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of kwallet-pam...
2 ScummVM: code execution via posix.cpp
An attacker can use a vulnerability via posix.cpp of ScummVM, in order to run code...
2 Zsh: buffer overflow via checkmailpath
An attacker can generate a buffer overflow via checkmailpath() of Zsh, in order to trigger a denial of service, and possibly to run code...
2 MAD: buffer overflow via mad_layer_III
An attacker can generate a buffer overflow via mad_layer_III() of MAD, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 816 817 818 819 820 821 822 823 824 826 828 829 830 831 832 833 834 835 836 841 861 881 901 921 941 961 981 993