The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: memory leak via dwc3_pci_probe
An attacker can create a memory leak via dwc3_pci_probe() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via sof_dfsentry_write
An attacker can create a memory leak via sof_dfsentry_write() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via sof_set_get_large_ctrl_data
An attacker can create a memory leak via sof_set_get_large_ctrl_data() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via komeda_wb_connector_add
An attacker can create a memory leak via komeda_wb_connector_add() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via af9005_identify_state
An attacker can create a memory leak via af9005_identify_state() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via ccp_run_sha_cmd
An attacker can create a memory leak via ccp_run_sha_cmd() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via sja1105_static_config_upload
An attacker can create a memory leak via sja1105_static_config_upload() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory leak via ql_alloc_large_buffers
An attacker can create a memory leak via ql_alloc_large_buffers() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: integer overflow via tcp_ack_update_rtt
An attacker can trigger an integer overflow via tcp_ack_update_rtt() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via binder.c
An attacker can force the usage of a freed memory area via binder.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
FriBidi: buffer overflow via Unicode Isolate Directional Characters
An attacker can trigger a buffer overflow via Unicode Isolate Directional Characters of FriBidi, in order to trigger a denial of service, and possibly to run code...
Cisco Web Security Appliance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Web Security Appliance, in order to run JavaScript code in the context of the web site...
Cisco Web Security Appliance: denial of service via Device Reset
An attacker can trigger a fatal error via Device Reset of Cisco Web Security Appliance, in order to trigger a denial of service...
Cisco Wireless LAN Controller: denial of service via HTTP Parsing Engine
An attacker can trigger a fatal error via HTTP Parsing Engine of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Prime Infrastructure: code execution via REST API HA Registration Period
An attacker can use a vulnerability via REST API HA Registration Period of Cisco Prime Infrastructure, in order to run code...
Ubuntu: information disclosure via Rygel Shared Media
An attacker can bypass access restrictions to data via Rygel Shared Media of Ubuntu, in order to obtain sensitive information...
Drupal Open Social: privilege escalation via Magic Login URLs
An attacker can bypass restrictions via Magic Login URLs of Drupal Open Social, in order to escalate his privileges...
IBM QRadar SIEM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site...
Linux kernel: memory corruption via pppol2tp_connect
An attacker can trigger a memory corruption via pppol2tp_connect() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Squid cache: five vulnerabilities
An attacker can use several vulnerabilities of Squid cache...
libssh2: out-of-bounds memory reading via SSH_MSG_DISCONNECT
An attacker can force a read at an invalid address via SSH_MSG_DISCONNECT of libssh2, in order to trigger a denial of service, or to obtain sensitive information...
SimpleSAMLphp: privilege escalation via SAML Signature Verification Bypass
An attacker can bypass restrictions via SAML Signature Verification Bypass of SimpleSAMLphp, in order to escalate his privileges...
Google Android/Pixel: multiple vulnerabilities of November 2019
An attacker can use several vulnerabilities of Google Android/Pixel...
Forcepoint Email Security: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Forcepoint Email Security, in order to run JavaScript code in the context of the web site...
Linux kernel: information disclosure via rcar_drif_g_fmt_sdr_cap
A local attacker can read a memory fragment via rcar_drif_g_fmt_sdr_cap() of the Linux kernel, in order to obtain sensitive information...
Joomla Core: two vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
GNU libiberty: memory leak via demangle_template
An attacker can create a memory leak via demangle_template() of GNU libiberty, in order to trigger a denial of service...
Virt-install: privilege escalation via Guest VM Password Process Listing
An attacker can bypass restrictions via Guest VM Password Process Listing of Virt-install, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 974 975 976 977 978 979 980 981 982 984 986 987 988 989 990 991 992 993 994 1001 1020