The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle Fusion Middleware: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Oracle Database: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
Microsoft Windows: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Core: vulnerabilities of January
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE: memory corruption
An attacker can trigger a memory corruption of Microsoft IE, in order to trigger a denial of service, and possibly to run code...
SUSE LE: denial of service via man safe-rm
An attacker can trigger a fatal error via man safe-rm of SUSE LE, in order to trigger a denial of service...
Linux kernel: memory leak via mwifiex_tm_cmd
An attacker can create a memory leak via mwifiex_tm_cmd() of the Linux kernel, in order to trigger a denial of service...
Spring Framework: memory leak via StringDecoder
An attacker can create a memory leak via StringDecoder of Spring Framework, in order to trigger a denial of service...
SAP: multiple vulnerabilities of January 2020
An attacker can use several vulnerabilities of SAP products...
Xen: information disclosure via ARM ERET Instruction Speculate
An attacker can bypass access restrictions to data via ARM ERET Instruction Speculate of Xen, in order to obtain sensitive information...
F5 BIG-IP APM: Cross Site Scripting via Portal Access
An attacker can trigger a Cross Site Scripting via Portal Access of F5 BIG-IP APM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP Engineering Hotfix: assertion error via L3hdr Set
An attacker can force an assertion error via L3hdr Set of F5 BIG-IP Engineering Hotfix, in order to trigger a denial of service...
F5 BIG-IP Engineering Hotfix: privilege escalation via TPM
An attacker can bypass restrictions via TPM of F5 BIG-IP Engineering Hotfix, in order to escalate his privileges...
Apache Kafka Connect: information disclosure via Tasks Endpoint Plaintext Secrets
An attacker can bypass access restrictions to data via Tasks Endpoint Plaintext Secrets of Apache Kafka Connect, in order to obtain sensitive information...
gThumb: buffer overflow via _cairo_image_surface_create_from_jpeg
An attacker can trigger a buffer overflow via _cairo_image_surface_create_from_jpeg() of gThumb, in order to trigger a denial of service, and possibly to run code...
RubyGem excon: information disclosure via Persistent Connection Sockets
An attacker can bypass access restrictions to data via Persistent Connection Sockets of RubyGem excon, in order to obtain sensitive information...
FFmpeg: memory corruption via h2645_parse
An attacker can trigger a memory corruption via h2645_parse() of FFmpeg, in order to trigger a denial of service, and possibly to run code...
libzypp: file reading via World Readable Assert Cookie
A local attacker can read a file via World Readable Assert Cookie of libzypp, in order to obtain sensitive information...
Ganglia Web Frontend: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Ganglia Web Frontend, in order to run JavaScript code in the context of the web site...
Node.js hot-formula-parser: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Node.js hot-formula-parser, in order to run code...
libvpx: use after free via ParseContentEncodingEntry
An attacker can force the usage of a freed memory area via ParseContentEncodingEntry() of libvpx, in order to trigger a denial of service, and possibly to run code...
Kubernetes: information disclosure via API Server URL Redirection
An attacker can bypass access restrictions to data via API Server URL Redirection of Kubernetes, in order to obtain sensitive information...
matio: integer overflow
An attacker can trigger an integer overflow of matio, in order to trigger a denial of service, and possibly to run code...
Slurm: two vulnerabilities
An attacker can use several vulnerabilities of Slurm...
makepasswd: privilege escalation via Weak Passwords
An attacker can bypass restrictions via Weak Passwords of makepasswd, in order to escalate his privileges...
Envoy: three vulnerabilities
An attacker can use several vulnerabilities of Envoy...
nginx: information disclosure via error_page Request Smuggling
An attacker can bypass access restrictions to data via error_page Request Smuggling of nginx, in order to obtain sensitive information...
HP InkJet: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HP InkJet, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 991 992 993 994 995 996 997 998 999 1001 1003 1004 1005 1006 1007 1008 1009 1010 1011 1021 1035