The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: memory corruption via nvme_cmb_ops
An attacker, inside a guest system, can generate a memory corruption via nvme_cmb_ops() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Ansible Core: information disclosure via ssh-keygen Command Line
An attacker can bypass access restrictions to data via ssh-keygen Command Line of Ansible Core, in order to obtain sensitive information...
Intel processors: information disclosure via SMT/Hyper-Threading PortSmash
An attacker can bypass access restrictions to data via SMT/Hyper-Threading PortSmash on an Intel processor, in order to obtain sensitive information...
QEMU: memory corruption via lsi53c895a-lsi_do_msgin
An attacker, inside a guest system, can generate a memory corruption via lsi53c895a::lsi_do_msgin() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Apache Tomcat JK mod_jk: information disclosure via Reverse Proxy
An attacker can bypass access restrictions to data via Reverse Proxy of Apache Tomcat JK mod_jk, in order to obtain sensitive information...
F5 BIG-IP: denial of service via iControl TMSH
An attacker can generate a fatal error via iControl TMSH of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via VLAN Group Port Lockdown
An attacker can generate a fatal error via VLAN Group Port Lockdown of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via HTTP Normalize URI
An attacker can generate a fatal error via HTTP Normalize URI of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: denial of service via Portal Access
An attacker can generate a fatal error via Portal Access of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP: denial of service via TMM SSL BAD_RECORD_MAC
An attacker can generate a fatal error via TMM SSL BAD_RECORD_MAC of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via Tmsh Edit Cli Preference
An attacker can generate a fatal error via Tmsh Edit Cli Preference of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via MQTT
An attacker can generate a fatal error via MQTT of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via Configuration Utility Commands
An attacker can bypass restrictions via Configuration Utility Commands of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via TMM MPTCP HUDCTL_ABORT
An attacker can generate a fatal error via TMM MPTCP HUDCTL_ABORT of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via tmsh
An attacker can bypass restrictions via tmsh of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP APM: privilege escalation via CRLDP Auth Revoked Certificates
An attacker can bypass restrictions via CRLDP Auth Revoked Certificates of F5 BIG-IP APM, in order to escalate his privileges...
sos-collector: file reading
A local attacker can read a file of sos-collector, in order to obtain sensitive information...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
libcurl: out-of-bounds memory reading via Warning Message
An attacker can force a read at an invalid address via Warning Message of libcurl, in order to trigger a denial of service, or to obtain sensitive information...
libcurl: use after free via Curl_close
An attacker can force the usage of a freed memory area via Curl_close() of libcurl, in order to trigger a denial of service, and possibly to run code...
libcurl: buffer overflow via Curl_auth_create_plain_message
An attacker can generate a buffer overflow via Curl_auth_create_plain_message() of libcurl, in order to trigger a denial of service, and possibly to run code...
libarchive: out-of-bounds memory reading via archive_read_format_rar_read_header
An attacker can force a read at an invalid address via archive_read_format_rar_read_header() of libarchive, in order to trigger a denial of service, or to obtain sensitive information...
WebSphere AS: code execution via OpenID Connect
An attacker can use a vulnerability via OpenID Connect of WebSphere AS, in order to run code...
RHEL 7: privilege escalation via setup
An attacker can bypass restrictions via setup of RHEL 7, in order to escalate his privileges...
LibRaw: NULL pointer dereference via leaf_hdr_load_raw
An attacker can force a NULL pointer to be dereferenced via leaf_hdr_load_raw() of LibRaw, in order to trigger a denial of service...
LibRaw: memory corruption via quicktake_100_load_raw
An attacker can generate a memory corruption via quicktake_100_load_raw() of LibRaw, in order to trigger a denial of service, and possibly to run code...
binutils nm: infinite loop
An attacker can generate an infinite loop of binutils nm, in order to trigger a denial of service...
OpenSSL: information disclosure via DSA Signature Generation
An attacker can bypass access restrictions to data via DSA Signature Generation of OpenSSL, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 869 870 871 872 873 874 875 876 877 879 881 882 883 884 885 886 887 888 889 901 921 941 961 981 1001 1021 1022