The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
FFmpeg: NULL pointer dereference via ff_mpeg4_decode_picture_header
An attacker can force a NULL pointer to be dereferenced via ff_mpeg4_decode_picture_header() of FFmpeg, in order to trigger a denial of service...
Wireshark: denial of service via CMS
An attacker can send malicious CMS packets to Wireshark, in order to trigger a denial of service...
Cyrus IMAP: privilege escalation via HTTP Request Authentication Context
An attacker can bypass restrictions via HTTP Request Authentication Context of Cyrus IMAP, in order to escalate his privileges...
Node.js strapi: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Node.js strapi, in order to escalate his privileges...
Linux kernel: use after free via serial_ir_init_module
An attacker can force the usage of a freed memory area via serial_ir_init_module() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
OpenBSD: privilege escalation via Mesa
An attacker can bypass restrictions via Mesa of OpenBSD, in order to escalate his privileges...
OpenBSD: privilege escalation via libcauth
An attacker can bypass restrictions via libcauth of OpenBSD, in order to escalate his privileges...
OpenBSD: privilege escalation via xenodm
An attacker can bypass restrictions via xenodm of OpenBSD, in order to escalate his privileges...
Calamares: file reading via LUKS Encryption Keyfile
A local attacker can read a file via LUKS Encryption Keyfile of Calamares, in order to obtain sensitive information...
Oniguruma: four vulnerabilities
An attacker can use several vulnerabilities of Oniguruma...
Linux kernel: memory corruption via USB Character Device Driver
An attacker can trigger a memory corruption via USB Character Device Driver of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via drivers/net/can/usb/peak_usb/pcan_usb_pro.c
A local attacker can read a memory fragment via drivers/net/can/usb/peak_usb/pcan_usb_pro.c of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via drivers/net/can/usb/peak_usb/pcan_usb_fd.c
A local attacker can read a memory fragment via drivers/net/can/usb/peak_usb/pcan_usb_fd.c of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via drivers/net/can/usb/peak_usb/pcan_usb_core.c
A local attacker can read a memory fragment via drivers/net/can/usb/peak_usb/pcan_usb_core.c of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via drivers/media/usb/ttusb-dec/ttusb_dec.c
A local attacker can read a memory fragment via drivers/media/usb/ttusb-dec/ttusb_dec.c of the Linux kernel, in order to obtain sensitive information...
Linux kernel: buffer overflow via HID Drivers
An attacker can trigger a buffer overflow via HID Drivers of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/usb/misc/yurex.c
An attacker can force the usage of a freed memory area via drivers/usb/misc/yurex.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/usb/class/cdc-acm.c
An attacker can force the usage of a freed memory area via drivers/usb/class/cdc-acm.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/net/can/usb/mcba_usb.c
An attacker can force the usage of a freed memory area via drivers/net/can/usb/mcba_usb.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/usb/misc/iowarrior.c
An attacker can force the usage of a freed memory area via drivers/usb/misc/iowarrior.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/hid/usbhid/hiddev.c
An attacker can force the usage of a freed memory area via drivers/hid/usbhid/hiddev.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/nfc/pn533/usb.c
An attacker can force the usage of a freed memory area via drivers/nfc/pn533/usb.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/net/ieee802154/atusb.c
An attacker can force the usage of a freed memory area via drivers/net/ieee802154/atusb.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/input/ff-memless.c
An attacker can force the usage of a freed memory area via drivers/input/ff-memless.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via drivers/usb/misc/adutux.c
An attacker can force the usage of a freed memory area via drivers/usb/misc/adutux.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Google Android/Pixel: multiple vulnerabilities of December 2019
An attacker can use several vulnerabilities of Google Android/Pixel...
Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox...
Ubuntu: memory corruption via OverlayFS/ShiftFS AUFS
An attacker can trigger a memory corruption via OverlayFS/ShiftFS AUFS of Ubuntu, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 983 984 985 986 987 988 989 990 991 993 995 996 997 998 999 1000 1001 1002 1003 1005