The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via ARM Unmasked Interrupts
An attacker, inside a guest system, can bypass restrictions via ARM Unmasked Interrupts of Xen, in order to escalate his privileges on the host system...
Xen: memory corruption via PCI Devices Deassignment
An attacker, inside a guest system, can trigger a memory corruption via PCI Devices Deassignment of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: denial of service via add-to-physmap
An attacker, inside a guest system, can trigger a fatal error via add-to-physmap of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Descriptor Table Limit
An attacker, inside a guest system, can bypass restrictions via Descriptor Table Limit of Xen, in order to escalate his privileges on the host system...
Xen: assertion error via VCPUOP_initialise
An attacker, inside a guest system, can force an assertion error via VCPUOP_initialise() of Xen, in order to trigger a denial of service on the host system...
Total Defense Anti-Virus: privilege escalation via Symbolic Link Write
An attacker can bypass restrictions via Symbolic Link Write of Total Defense Anti-Virus, in order to escalate his privileges...
Total Defense Anti-Virus: denial of service via File Delete
An attacker can trigger a fatal error via File Delete of Total Defense Anti-Virus, in order to trigger a denial of service...
libxml2: multiple vulnerabilities
An attacker can use several vulnerabilities of libxml2...
OpenBSD: denial of service via bgpd NextHop Change
An attacker can trigger a fatal error via bgpd NextHop Change of OpenBSD, in order to trigger a denial of service...
Python ECDSA: information disclosure via DER Encoded Signatures
An attacker can bypass access restrictions to data via DER Encoded Signatures of Python ECDSA, in order to obtain sensitive information...
FreeTDS: denial of service via Data Types
An attacker can trigger a fatal error via Data Types of FreeTDS, in order to trigger a denial of service...
LibVNC: information disclosure via rfbSendServerCutText
A local attacker can read a memory fragment via rfbSendServerCutText() of LibVNC, in order to obtain sensitive information...
IMAPFilter: Man-in-the-Middle via Peer Hostname Validation
An attacker can act as a Man-in-the-Middle via Peer Hostname Validation on IMAPFilter, in order to read or write data in the session...
pam-python: privilege escalation via Default Environment Variable
An attacker can bypass restrictions via Default Environment Variable of pam-python, in order to escalate his privileges...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Apport: information disclosure via Privileged Crash Dump
An attacker can bypass access restrictions to data via Privileged Crash Dump of Apport, in order to obtain sensitive information...
Apport: denial of service via Lock File Creation
An attacker can trigger a fatal error via Lock File Creation of Apport, in order to trigger a denial of service...
Apport: information disclosure via Container Crash Dumps
An attacker can bypass access restrictions to data via Container Crash Dumps of Apport, in order to obtain sensitive information...
Apport: information disclosure via Core Dump Creation
An attacker can bypass access restrictions to data via Core Dump Creation of Apport, in order to obtain sensitive information...
Apport: file reading
A local attacker can read a file of Apport, in order to obtain sensitive information...
Whoopsie: code execution via Large Crash Report
An attacker can use a vulnerability via Large Crash Report of Whoopsie, in order to run code...
FortiClient for Mac OS: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of FortiClient for Mac OS, in order to escalate his privileges...
GNU libidn2: buffer overflow via idn2_to_ascii_4i
An attacker can trigger a buffer overflow via idn2_to_ascii_4i() of GNU libidn2, in order to trigger a denial of service, and possibly to run code...
GNU libidn2: privilege escalation via A-labels To U-labels Conversion
An attacker can bypass restrictions via A-labels To U-labels Conversion of GNU libidn2, in order to escalate his privileges...
Samba: three vulnerabilities
An attacker can use several vulnerabilities of Samba...
Trend Micro OfficeScan: privilege escalation via Root Login Bypass
An attacker can bypass restrictions via Root Login Bypass of Trend Micro OfficeScan, in order to escalate his privileges...
Trend Micro OfficeScan: directory traversal via ZIP
An attacker can traverse directories of Trend Micro OfficeScan, in order to create a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 973 974 975 976 977 978 979 980 981 983 985 986 987 988 989 990 991 992 993 1001 1003