The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Xen: memory corruption via AMD IOMMU Pagetables Dynamic Height
An attacker, inside a guest system, can trigger a memory corruption via AMD IOMMU Pagetables Dynamic Height of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
Xen: memory corruption via Linear Pagetable Miscounts
An attacker, inside a guest system, can trigger a memory corruption via Linear Pagetable Miscounts of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: denial of service via Debug Exceptions Blocked States
An attacker can trigger a fatal error via Debug Exceptions Blocked States of Xen, in order to trigger a denial of service...
Xen: denial of service via find_next_bit
An attacker, inside a guest system, can trigger a fatal error via find_next_bit() of Xen, in order to trigger a denial of service on the host system...
Linux kernel: buffer overflow via KVM_GET_EMULATED_CPUID
An attacker can trigger a buffer overflow via KVM_GET_EMULATED_CPUID of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Apple iOS: out-of-bounds memory reading via FaceTime
An attacker can force a read at an invalid address via FaceTime of Apple iOS, in order to trigger a denial of service, or to obtain sensitive information...
Git: multiple vulnerabilities
An attacker can use several vulnerabilities of Git...
Git: code execution via Submodule Update
An attacker can use a vulnerability via Submodule Update of Git, in order to run code...
libssh: code execution via ssh_scp_new
An attacker can use a vulnerability via ssh_scp_new() of libssh, in order to run code...
Windows: vulnerabilities of December 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Skype for Business Server 2019: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft Skype for Business Server, in order to obtain sensitive information...
Microsoft SQL Server Reporting Services: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft SQL Server Reporting Services, in order to obtain sensitive information...
Microsoft Visual Studio: information disclosure via Spoofing
An attacker can bypass access restrictions to data via Spoofing of Microsoft Visual Studio, in order to obtain sensitive information...
Microsoft Office: vulnerabilities of December 2019
An attacker can use several vulnerabilities of Microsoft products...
Internet Explorer: code execution
An attacker can use a vulnerability of Internet Explorer, in order to run code...
SAP: multiple vulnerabilities of December 2019
An attacker can use several vulnerabilities of SAP products...
SUSE LE: read-write access via Postgresql Directory Permissions
An attacker can bypass access restrictions via Postgresql Directory Permissions of SUSE LE, in order to read or alter data...
Linux kernel: information disclosure via KVM MSR_IA32_TSX_CTRL
An attacker, inside a guest system, can bypass access restrictions to data via KVM MSR_IA32_TSX_CTRL of the Linux kernel, in order to obtain sensitive information on the host system...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Alcatel-Lucent OmniVista 8770: code execution
An attacker can use a vulnerability of Alcatel-Lucent OmniVista, in order to run code...
SQLite: read-write access via PRAGMA Integrity_check Comparison Operator
An attacker can bypass access restrictions via PRAGMA Integrity_check Comparison Operator of SQLite, in order to read or alter data...
SQLite: denial of service via Unused CTE View Recursion
An attacker can trigger a fatal error via Unused CTE View Recursion of SQLite, in order to trigger a denial of service...
SQLite: privilege escalation via Shadow Table Name
An attacker can bypass restrictions via Shadow Table Name of SQLite, in order to escalate his privileges...
Samba: privilege escalation via DelegationNotAllowed S4U2Self
An attacker can bypass restrictions via DelegationNotAllowed S4U2Self of Samba, in order to escalate his privileges...
Samba: denial of service via AD DC Zone-named Record
An attacker can trigger a fatal error via AD DC Zone-named Record of Samba, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 985 986 987 988 989 990 991 992 993 995 997 998 999 1000 1001 1002 1003 1004 1005