The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: use after free via Perf_trace_lock_acquire
An attacker can force the usage of a freed memory area via Perf_trace_lock_acquire of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via __blk_add_trace
An attacker can force the usage of a freed memory area via __blk_add_trace() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via ext4_expand_extra_isize
An attacker can force the usage of a freed memory area via ext4_expand_extra_isize() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Knot Resolver: denial of service via DNS Replies Many RR
An attacker can trigger a fatal error via DNS Replies Many RR of Knot Resolver, in order to trigger a denial of service...
Linux kernel: denial of service via Inter-Access Point Protocol
An attacker can trigger a fatal error via Inter-Access Point Protocol of the Linux kernel, in order to trigger a denial of service...
Node.js npm CLI: three vulnerabilities
An attacker can use several vulnerabilities of Node.js npm CLI...
Node.js bin-links: three vulnerabilities
An attacker can use several vulnerabilities of Node.js bin-links...
SPIP: SQL injection
An attacker can use a SQL injection of SPIP, in order to read or alter data...
Telerik UI for ASP.NET AJAX: code execution via RadAsyncUpload JavaScriptSerializer Deserialization
An attacker can use a vulnerability via RadAsyncUpload JavaScriptSerializer Deserialization of Telerik UI for ASP.NET AJAX, in order to run code...
OpenBSD: privilege escalation via ld.so suid/sgid LD_LIBRARY_PATH
An attacker can bypass restrictions via ld.so suid/sgid LD_LIBRARY_PATH of OpenBSD, in order to escalate his privileges...
Drupal Webform: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Webform...
Drupal Permissions by Term: information disclosure
An attacker can bypass access restrictions to data of Drupal Permissions by Term, in order to obtain sensitive information...
Drupal Modal Page: privilege escalation
An attacker can bypass restrictions of Drupal Modal Page, in order to escalate his privileges...
Drupal Taxonomy Access Fix: privilege escalation
An attacker can bypass restrictions of Drupal Taxonomy Access Fix, in order to escalate his privileges...
Drupal Smart Trim: Cross Site Scripting via Text Summary Fields
An attacker can trigger a Cross Site Scripting via Text Summary Fields of Drupal Smart Trim, in order to run JavaScript code in the context of the web site...
Node.js serialize-javascript: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js serialize-javascript, in order to run JavaScript code in the context of the web site...
Shadowsocks-libev: two vulnerabilities
An attacker can use several vulnerabilities of Shadowsocks-libev...
RSA Authentication Manager: vulnerability via iDRAC
A vulnerability via iDRAC of RSA Authentication Manager was announced...
WebSphere AS Liberty: Cross Site Scripting via Web UI
An attacker can trigger a Cross Site Scripting via Web UI of WebSphere AS Liberty, in order to run JavaScript code in the context of the web site...
DENX U-Boot: buffer overflow
An attacker can trigger a buffer overflow of DENX U-Boot, in order to trigger a denial of service, and possibly to run code...
Siemens SIMATIC: Man-in-the-Middle via 102/tcp
An attacker can act as a Man-in-the-Middle via 102/tcp on Siemens SIMATIC, in order to read or write data in the session...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Xen: memory corruption via AMD IOMMU Pagetables Dynamic Height
An attacker, inside a guest system, can trigger a memory corruption via AMD IOMMU Pagetables Dynamic Height of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
Xen: memory corruption via Linear Pagetable Miscounts
An attacker, inside a guest system, can trigger a memory corruption via Linear Pagetable Miscounts of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: denial of service via Debug Exceptions Blocked States
An attacker can trigger a fatal error via Debug Exceptions Blocked States of Xen, in order to trigger a denial of service...
Xen: denial of service via find_next_bit
An attacker, inside a guest system, can trigger a fatal error via find_next_bit() of Xen, in order to trigger a denial of service on the host system...
Linux kernel: buffer overflow via KVM_GET_EMULATED_CPUID
An attacker can trigger a buffer overflow via KVM_GET_EMULATED_CPUID of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 985 986 987 988 989 990 991 992 993 995 997 998 999 1000 1001 1002 1003 1004 1005 1021 1041 1061 1081 1092