The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SPIP: read-write access
An attacker can bypass access restrictions of SPIP, in order to read or alter data...
Node.js gitlabhook: shell command injection
An attacker can use a vulnerability of Node.js gitlabhook, in order to run code...
Notepad++: buffer overflow via Scintilla
An attacker can trigger a buffer overflow via Scintilla of Notepad++, in order to trigger a denial of service, and possibly to run code...
Sphinx: information disclosure via missing authentication
An attacker can bypass access restrictions to data because of lack of authentication in Sphinx, in order to obtain sensitive information...
Linux kernel: out-of-bounds memory reading via ath6kl_wmi_pstream_timeout_event_rx
An attacker can force a read at an invalid address via ath6kl_wmi_pstream_timeout_event_rx() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: NULL pointer dereference via fm10k_init_module
An attacker can force a NULL pointer to be dereferenced via fm10k_init_module() of the Linux kernel, in order to trigger a denial of service...
Freeware Advanced Audio Coder: multiple vulnerabilities
An attacker can use several vulnerabilities of Freeware Advanced Audio Coder...
Intel PROSet/Wireless WiFi Software: denial of service
An attacker can trigger a fatal error of Intel PROSet/Wireless WiFi Software, in order to trigger a denial of service...
phpMyAdmin: Cross Site Request Forgery via the "servers" page
An attacker can trigger a Cross Site Request Forgery via servers of phpMyAdmin, in order to force the victim to perform operations...
Linux kernel: out-of-bounds memory reading via hclge_tm_schd_mode_vnet_base_cfg
An attacker can force a read at an invalid address via hclge_tm_schd_mode_vnet_base_cfg() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: out-of-bounds memory reading via drivers/scsi/qedi/qedi_dbg.c
An attacker can force a read at an invalid address via drivers/scsi/qedi/qedi_dbg.c of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Joomla PayPlans: information disclosure
An attacker can bypass access restrictions to data of Joomla PayPlans, in order to obtain sensitive information...
Oniguruma: denial of service via Regparse.c Recursion
An attacker can trigger a fatal error via Regparse.c Recursion of Oniguruma, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via alloc_workqueue
An attacker can force a NULL pointer to be dereferenced via alloc_workqueue of the Linux kernel, in order to trigger a denial of service...
ArcGIS Enterprise: information disclosure via Edit My Profile
An attacker can bypass access restrictions to data via Edit My Profile of ArcGIS Enterprise, in order to obtain sensitive information...
TeamViewer: privilege escalation via Intercepted Credentials
An attacker can bypass restrictions via Intercepted Credentials of TeamViewer, in order to escalate his privileges...
Wireshark: infinite loop via Gryphon
An attacker can trigger an infinite loop via Gryphon of Wireshark, in order to trigger a denial of service...
OpenSC: out-of-bounds memory reading via asn1_decode_entry
An attacker can force a read at an invalid address via asn1_decode_entry() of OpenSC, in order to trigger a denial of service, or to obtain sensitive information...
OpenSC: out-of-bounds memory reading via decode_bit_string
An attacker can force a read at an invalid address via decode_bit_string() of OpenSC, in order to trigger a denial of service, or to obtain sensitive information...
Intel Xeon: information disclosure via DDIO NetCAT
An attacker can bypass access restrictions to data via DDIO NetCAT of Intel Xeon, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 958 959 960 961 962 963 964 965 966 968 970 971 972 973 974 975 976 977 978 981 1001 1013