The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Xen: denial of service via X86 PV Page Table Preemption
An attacker, inside a guest system, can trigger a fatal error via X86 PV Page Table Preemption of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via PV IOMMU Discipline
An attacker, inside a guest system, can bypass restrictions via PV IOMMU Discipline of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Steal_page Page_struct Access Discipline
An attacker, inside a guest system, can bypass restrictions via Steal_page Page_struct Access Discipline of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Pass-through Device Hotplug Race
An attacker, inside a guest system, can bypass restrictions via Pass-through Device Hotplug Race of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via Grant Table Transfer
An attacker, inside a guest system, can bypass restrictions via Grant Table Transfer of Xen, in order to escalate his privileges on the host system...
Synology DSM Office: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology DSM Office, in order to run JavaScript code in the context of the web site...
WordPress Forminator Contact Form: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Forminator Contact Form...
Open Build Service: three vulnerabilities
An attacker can use several vulnerabilities of Open Build Service...
WebSphere AS: Cross Site Scripting via Admin Console
An attacker can trigger a Cross Site Scripting via Admin Console of WebSphere AS, in order to run JavaScript code in the context of the web site...
MacOS: privilege escalation via copy-on-write
An attacker can bypass restrictions via copy-on-write of MacOS, in order to escalate his privileges...
Joomla Kunena: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Kunena, in order to run JavaScript code in the context of the web site...
Chrome: use after free via FileReader
An attacker can force the usage of a freed memory area via FileReader of Chrome, in order to trigger a denial of service, and possibly to run code...
Alcatel-Lucent Enterprise OmniAccess WLAN Instant: multiple vulnerabilities
An attacker can use several vulnerabilities of Alcatel-Lucent Enterprise OmniAccess WLAN Instant...
Check Point ZoneAlarm: privilege escalation via WCF Service
An attacker can bypass restrictions via WCF Service of Check Point ZoneAlarm, in order to escalate his privileges...
pfSense: privilege escalation via SSHGUARD IP Blocking
An attacker can bypass restrictions via SSHGUARD IP Blocking of pfSense, in order to escalate his privileges...
UnZip: buffer overflow via list.c
An attacker can trigger a buffer overflow via list.c of UnZip, in order to trigger a denial of service, and possibly to run code...
jackson-databind: information disclosure via Default Typing
An attacker can bypass access restrictions to data via Default Typing of jackson-databind, in order to obtain sensitive information...
RSA Authentication Manager: privilege escalation via Previous Domain Password
An attacker can bypass restrictions via Previous Domain Password of RSA Authentication Manager, in order to escalate his privileges...
Kubernetes: infinite loop via API Server json-patch
An attacker can trigger an infinite loop via API Server json-patch of Kubernetes, in order to trigger a denial of service...
Xpdf: three vulnerabilities
An attacker can use several vulnerabilities of Xpdf...
Xpdf: two vulnerabilities
An attacker can use several vulnerabilities of Xpdf...
Xpdf: out-of-bounds memory reading via SplashXPath-strokeAdjust
An attacker can force a read at an invalid address via SplashXPath::strokeAdjust() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information...
distcc: privilege escalation via IP Address Whitelist
An attacker can bypass restrictions via IP Address Whitelist of distcc, in order to escalate his privileges...
AdvanceCOMP: integer overflow via png_compress
An attacker can trigger an integer overflow via png_compress() of AdvanceCOMP, in order to trigger a denial of service, and possibly to run code...
Node Core: denial of service via Keep-alive HTTP
An attacker can trigger a fatal error via Keep-alive HTTP of Node Core, in order to trigger a denial of service...
Node Core: denial of service via Slowloris HTTP Keep-alive
An attacker can trigger a fatal error via Slowloris HTTP Keep-alive of Node Core, in order to trigger a denial of service...
OpenBSD: privilege escalation via Fragmented IPv6 Packets
An attacker can bypass restrictions via Fragmented IPv6 Packets of OpenBSD, in order to escalate his privileges...
file: out-of-bounds memory reading via do_bid_note
An attacker can force a read at an invalid address via do_bid_note() of file, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 902 903 904 905 906 907 908 909 910 912 914 915 916 917 918 919 920 921 922 941 961 981 1001 1021 1041 1061 1081 1101 1103