The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
tcpdump: out-of-bounds memory reading via print_prefix
An attacker can force a read at an invalid address via print_prefix() of tcpdump, in order to trigger a denial of service, or to obtain sensitive information...
Open vSwitch: three vulnerabilities
An attacker can use several vulnerabilities of Open vSwitch...
SQLite, Chrome: memory corruption via FTS3 Query
An attacker can generate a memory corruption via a FTS3 query of SQLite, in order to trigger a denial of service, and possibly to run code...
Contao: information disclosure via Back End Users Records View
An attacker can bypass access restrictions to data via Back End Users Records View of Contao, in order to obtain sensitive information...
Ansible Core: information disclosure via Logged Ssh Retry
An attacker can bypass access restrictions to data via Logged Ssh Retry of Ansible Core, in order to obtain sensitive information...
QEMU: file reading via usb_mtp_get_object
A local attacker can read a file via usb_mtp_get_object() of QEMU, in order to obtain sensitive information on the host system...
WordPress Core: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Chrome: use after free via PDFium
An attacker can force the usage of a freed memory area via PDFium of Chrome, in order to trigger a denial of service, and possibly to run code...
HAProxy: infinite loop via dns_read_name
An attacker can generate an infinite loop via dns_read_name() of HAProxy, in order to trigger a denial of service...
WordPress Import users from CSV with meta: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Import users from CSV with meta, in order to run JavaScript code in the context of the web site...
QEMU: memory leak via pvrdma_realize
An attacker, inside a guest system, can create a memory leak via pvrdma_realize() of QEMU, in order to trigger a denial of service on the host system...
Singularity: privilege escalation via Shared Mount Propagation
An attacker can bypass restrictions via Shared Mount Propagation of Singularity, in order to escalate his privileges...
Node.js underscore.string: denial of service via Regular Expression
An attacker can generate a fatal error via Regular Expression of Node.js underscore.string, in order to trigger a denial of service...
FreeRDP: multiple vulnerabilities
An attacker can use several vulnerabilities of FreeRDP...
F5 BIG-IP: privilege escalation via SNMPv3 Clear Passphrases
An attacker can bypass restrictions via SNMPv3 Clear Passphrases of F5 BIG-IP, in order to escalate his privileges...
Firefox: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox...
Linux kernel: privilege escalation via Userfaultfd Sparse Tmpfs Files Write
An attacker can bypass restrictions via Userfaultfd Sparse Tmpfs Files Write of the Linux kernel, in order to escalate his privileges...
NetBSD: information disclosure via bozohttpd htpasswd
An attacker can bypass access restrictions to data via bozohttpd htpasswd of NetBSD, in order to obtain sensitive information...
Microsoft Visual Studio: vulnerabilities of July 2018
An attacker can use several vulnerabilities of Microsoft products...
Solaris: privilege escalation via RPC Component
An attacker can bypass restrictions via RPC Component of Solaris, in order to escalate his privileges...
Microsoft Exchange: privilege escalation via Profile Data Tampering
An attacker can bypass restrictions via Profile Data Tampering of Microsoft Exchange, in order to escalate his privileges...
Microsoft Visual Studio: privilege escalation via Diagnostics Hub Standard Collector Service
An attacker can bypass restrictions via Diagnostics Hub Standard Collector Service of Microsoft Visual Studio, in order to escalate his privileges...
Microsoft Windows: vulnerabilities of December 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of December 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET: vulnerabilities of December 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of December 2018
An attacker can use several vulnerabilities of Microsoft products...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
SAP: multiples vulnerabilities of December 2018
An attacker can use several vulnerabilities of SAP products...
phpMyAdmin: three vulnerabilities
An attacker can use several vulnerabilities of phpMyAdmin...
TYPO3 Core: eight vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 882 883 884 885 886 887 888 889 891 893 894 895 896 897 898 899 900 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1133