The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Intel Xeon Scalable Processor: denial of service via Voltage Modulation
An attacker can trigger a fatal error via Voltage Modulation of Intel Xeon Scalable Processor, in order to trigger a denial of service...
Linux kernel: out-of-bounds memory reading via nvmet_fc_find_target_queue
An attacker can force a read at an invalid address via nvmet_fc_find_target_queue() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Intel Processors: information disclosure via TSX Asynchronous Abort
An attacker can bypass access restrictions to data via TSX Asynchronous Abort of Intel Processors, in order to obtain sensitive information...
Linux kernel CIFS Client, Samba Client: directory traversal
An attacker can traverse directories of the Linux kernel CIFS Client or the Samba Client, in order to create a file outside the service root path...
Intel Graphic Driver: denial of service via Userspace Write On Blitter Command Streamer
An attacker can trigger a fatal error via Userspace Write On Blitter Command Streamer of Intel Graphic Driver, in order to trigger a denial of service...
Intel i915 Graphic Chipset: denial of service via MMIO Userspace Read
An attacker can trigger a fatal error via MMIO Userspace Read of Intel i915 Graphic Chipset, in order to trigger a denial of service...
Intel Processors: denial of service via Machine Check Error On Page Size Change
An attacker, inside a guest system, can trigger a fatal error via Machine Check Error On Page Size Change of Intel Processors, in order to trigger a denial of service on the host system...
Microsoft Windows: vulnerabilities of November 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: privilege escalation
An attacker can bypass restrictions of Microsoft Visual Studio, in order to escalate his privileges...
Microsoft Office: vulnerabilities of November 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange Server: code execution
An attacker can use a vulnerability of Microsoft Exchange Server, in order to run code...
Microsoft IE/Edge: vulnerabilities of November 2019
An attacker can use several vulnerabilities of Microsoft products...
SAP: multiple vulnerabilities of November 2019
An attacker can use several vulnerabilities of SAP products...
Synology Assistant: denial of service
An attacker can trigger a fatal error of Synology Assistant, in order to trigger a denial of service...
Node.js strapi: privilege escalation via Password Reset
An attacker can bypass restrictions via Password Reset of Node.js strapi, in order to escalate his privileges...
Cisco ASA: privilege escalation via Lua Interpreter
An attacker can bypass restrictions via Lua Interpreter of Cisco ASA, in order to escalate his privileges...
Siemens SIMATIC S7: privilege escalation via Diagnostic Functionality
An attacker can bypass restrictions via Diagnostic Functionality of Siemens SIMATIC S7, in order to escalate his privileges...
IBM QRadar SIEM: privilege escalation via Incorrect Authorization
An attacker can bypass restrictions via Incorrect Authorization of IBM QRadar SIEM, in order to escalate his privileges...
IBM QRadar SIEM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site...
IBM Navigator for i: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM Navigator for i, in order to run JavaScript code in the context of the web site...
MuPDF: infinite loop via svg_dev_end_tile
An attacker can trigger an infinite loop via svg_dev_end_tile() of MuPDF, in order to trigger a denial of service...
MuPDF: buffer overflow via fz_append_display_node
An attacker can trigger a buffer overflow via fz_append_display_node() of MuPDF, in order to trigger a denial of service, and possibly to run code...
crun: vulnerability
A vulnerability of crun was announced...
Ampache: two vulnerabilities
An attacker can use several vulnerabilities of Ampache...
haml: code execution via Special Characters
An attacker can use a vulnerability via Special Characters of haml, in order to run code...
DjVuLibre: NULL pointer dereference via DJVU-filter_fv
An attacker can force a NULL pointer to be dereferenced via DJVU::filter_fv() of DjVuLibre, in order to trigger a denial of service...
GDAL: use after free via OGRExpatRealloc
An attacker can force the usage of a freed memory area via OGRExpatRealloc() of GDAL, in order to trigger a denial of service, and possibly to run code...
FortiClient for Mac OS: information disclosure via Console Window Clear Text Password
An attacker can bypass access restrictions to data via Console Window Clear Text Password of FortiClient for Mac OS, in order to obtain sensitive information...
Linux kernel: use after free via aa_label_parse
An attacker can force the usage of a freed memory area via aa_label_parse() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 975 976 977 978 979 980 981 982 983 985 987 988 989 990 991 992 993 994 995 1001 1021 1041 1059