The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Apple iOS: out-of-bounds memory reading via FaceTime
An attacker can force a read at an invalid address via FaceTime of Apple iOS, in order to trigger a denial of service, or to obtain sensitive information...
Git: multiple vulnerabilities
An attacker can use several vulnerabilities of Git...
Git: code execution via Submodule Update
An attacker can use a vulnerability via Submodule Update of Git, in order to run code...
libssh: code execution via ssh_scp_new
An attacker can use a vulnerability via ssh_scp_new() of libssh, in order to run code...
Windows: vulnerabilities of December 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Skype for Business Server 2019: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft Skype for Business Server, in order to obtain sensitive information...
Microsoft SQL Server Reporting Services: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft SQL Server Reporting Services, in order to obtain sensitive information...
Microsoft Visual Studio: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft Visual Studio, in order to obtain sensitive information...
Microsoft Office: vulnerabilities of December 2019
An attacker can use several vulnerabilities of Microsoft products...
Internet Explorer: code execution
An attacker can use a vulnerability of Internet Explorer, in order to run code...
SAP: multiple vulnerabilities of December 2019
An attacker can use several vulnerabilities of SAP products...
SUSE LE: read-write access via Postgresql Directory Permissions
An attacker can bypass access restrictions via Postgresql Directory Permissions of SUSE LE, in order to read or alter data...
Linux kernel: information disclosure via KVM MSR_IA32_TSX_CTRL
An attacker, inside a guest system, can bypass access restrictions to data via KVM MSR_IA32_TSX_CTRL of the Linux kernel, in order to obtain sensitive information on the host system...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Alcatel-Lucent OmniVista 8770: code execution
An attacker can use a vulnerability of Alcatel-Lucent OmniVista, in order to run code...
OpenStack Keystone: information disclosure via List Credentials API
An attacker can bypass access restrictions to data via List Credentials API of OpenStack Keystone, in order to obtain sensitive information...
SQLite: read-write access via PRAGMA Integrity_check Comparison Operator
An attacker can bypass access restrictions via PRAGMA Integrity_check Comparison Operator of SQLite, in order to read or alter data...
SQLite: denial of service via Unused CTE View Recursion
An attacker can trigger a fatal error via Unused CTE View Recursion of SQLite, in order to trigger a denial of service...
SQLite: privilege escalation via Shadow Table Name
An attacker can bypass restrictions via Shadow Table Name of SQLite, in order to escalate his privileges...
Samba: privilege escalation via DelegationNotAllowed S4U2Self
An attacker can bypass restrictions via DelegationNotAllowed S4U2Self of Samba, in order to escalate his privileges...
Samba: denial of service via AD DC Zone-named Record
An attacker can trigger a fatal error via AD DC Zone-named Record of Samba, in order to trigger a denial of service...
Xpdf: NULL pointer dereference via Catalog.pageLabels
An attacker can force a NULL pointer to be dereferenced via Catalog.pageLabels of Xpdf, in order to trigger a denial of service...
HTMLDOC: memory corruption via htmldoc/ps-pdf.cxx
An attacker can trigger a memory corruption via htmldoc/ps-pdf.cxx of HTMLDOC, in order to trigger a denial of service, and possibly to run code...
Linux kernel: out-of-bounds memory reading via f2fs_build_segment_manager
An attacker can force a read at an invalid address via f2fs_build_segment_manager() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: use after free via try_merge_free_space
An attacker can force the usage of a freed memory area via try_merge_free_space() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via ext4_put_super
An attacker can force the usage of a freed memory area via ext4_put_super() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Eclipse OpenJ9: privilege escalation via Diagnostic Operations
An attacker can bypass restrictions via Diagnostic Operations of Eclipse OpenJ9, in order to escalate his privileges...
Linux kernel: memory leak via netdev_register_kobject
An attacker can create a memory leak via netdev_register_kobject() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: privilege escalation via drivers/media/platform/vivid
An attacker can bypass restrictions via drivers/media/platform/vivid of the Linux kernel, in order to escalate his privileges...
OpenBSD: privilege escalation via Suauth User Login Class
An attacker can bypass restrictions via Suauth User Login Class of OpenBSD, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 984 985 986 987 988 989 990 991 992 994 996 997 998 999 1000 1001 1002 1003 1004 1021 1041 1061 1069