The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: use after free via atalk_proc_exit
An attacker can force the usage of a freed memory area via atalk_proc_exit() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Cisco Unified Contact Center Express: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Contact Center Express, in order to run JavaScript code in the context of the web site...
Cisco IOS XE NGWC: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco IOS XE NGWC, in order to force the victim to perform operations...
Drupal Imagecache External: information disclosure via Sent session token
An attacker can bypass access restrictions to data via Sent session token of Drupal Imagecache External, in order to obtain sensitive information...
ClamAV: denial of service via Zip Bomb Variation
An attacker can trigger a fatal error via Zip Bomb Variation of ClamAV, in order to trigger a denial of service...
IBM Informix Dynamic Server: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM Informix Dynamic Server...
Forcepoint NGFW: privilege escalation via LDAP Authentication
An attacker can bypass restrictions via LDAP Authentication of Forcepoint NGFW, in order to escalate his privileges...
IBM API Connect: directory traversal
An attacker can traverse directories of IBM API Connect, in order to read a file outside the service root path...
IBM API Connect: information disclosure via API Swagger
An attacker can bypass access restrictions to data via API Swagger of IBM API Connect, in order to obtain sensitive information...
Linux kernel: use after free via tcp_output.c
An attacker can force the usage of a freed memory area via tcp_output.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Webmin: Cross Site Scripting via Authentic Theme
An attacker can trigger a Cross Site Scripting via Authentic Theme of Webmin, in order to run JavaScript code in the context of the web site...
Google Android OS: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Android OS...
Linux kernel: NULL pointer dereference via sound/usb/line6/driver.c
An attacker can force a NULL pointer to be dereferenced via sound/usb/line6/driver.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via sound/usb/helper.c
An attacker can force a NULL pointer to be dereferenced via sound/usb/helper.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via sound/usb/line6/pcm.c
An attacker can force a NULL pointer to be dereferenced via sound/usb/line6/pcm.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: use after free via drivers/net/wireless/intersil/p54/p54usb.c
An attacker can force the usage of a freed memory area via drivers/net/wireless/intersil/p54/p54usb.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via drivers/usb/misc/sisusbvga/sisusb.c
An attacker can force a NULL pointer to be dereferenced via drivers/usb/misc/sisusbvga/sisusb.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via drivers/media/usb/siano/smsusb.c
An attacker can force a NULL pointer to be dereferenced via drivers/media/usb/siano/smsusb.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via drivers/media/usb/zr364xx/zr364xx.c
An attacker can force a NULL pointer to be dereferenced via drivers/media/usb/zr364xx/zr364xx.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via drivers/usb/misc/yurex.c
An attacker can force a NULL pointer to be dereferenced via drivers/usb/misc/yurex.c of the Linux kernel, in order to trigger a denial of service...
Linux kernel: use after free via drivers/media/usb/cpia2/cpia2_usb.c
An attacker can force the usage of a freed memory area via drivers/media/usb/cpia2/cpia2_usb.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via sound/core
An attacker can force the usage of a freed memory area via sound/core of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/media/usb/dvb-usb/dvb-usb-init.c
An attacker can force the usage of a freed memory area via drivers/media/usb/dvb-usb/dvb-usb-init.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/usb/misc/rio500.c
An attacker can force the usage of a freed memory area via drivers/usb/misc/rio500.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/media/radio/radio-raremono.c
An attacker can force the usage of a freed memory area via drivers/media/radio/radio-raremono.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via flexcop_usb_probe
An attacker can force a NULL pointer to be dereferenced via flexcop_usb_probe() of the Linux kernel, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 951 952 953 954 955 956 957 958 959 961 963 964 965 966 967 968 969 970 971 981 1001 1021 1041 1050