The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Nextcloud Server: privilege escalation via Workflow Rules MIME File Extension
An attacker can bypass restrictions via Workflow Rules MIME File Extension of Nextcloud Server, in order to escalate his privileges...
OpenBSD: memory corruption via vmm_pvclock
An attacker, inside a guest system, can trigger a memory corruption via vmm_pvclock of OpenBSD, in order to trigger a denial of service, and possibly to run code on the host system...
FortiManager: information disclosure via Cross-Site WebSocket Hijacking
An attacker can bypass access restrictions to data via Cross-Site WebSocket Hijacking of FortiManager, in order to obtain sensitive information...
radare2: memory corruption via r_asm_pseudo_incbin
An attacker can trigger a memory corruption via r_asm_pseudo_incbin() of radare2, in order to trigger a denial of service, and possibly to run code...
radare2: integer overflow via new_token_size
An attacker can trigger an integer overflow via new_token_size() of radare2, in order to trigger a denial of service, and possibly to run code...
Horde Data: code execution
An attacker can use a vulnerability of Horde Data, in order to run code...
PostgreSQL: denial of service via ALTER DEPENDS ON EXTENSION
An attacker can trigger a fatal error via ALTER DEPENDS ON EXTENSION of PostgreSQL, in order to trigger a denial of service...
PAN-OS: privilege escalation via XML Injection
An attacker can bypass restrictions via XML Injection of PAN-OS, in order to escalate his privileges...
libarchive: denial of service via RAR5
An attacker can trigger a fatal error via RAR5 of libarchive, in order to trigger a denial of service...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Best Practical Request Tracker: denial of service via Email Address Parsing Algorithmic Complexity
An attacker can trigger a fatal error via Email Address Parsing Algorithmic Complexity of Best Practical Request Tracker, in order to trigger a denial of service...
Zope: SQL injection via DTML Connection Objects
An attacker can use a SQL injection via DTML Connection Objects of Zope, in order to read or alter data...
Digi ConnectPort LTS: multiple vulnerabilities
An attacker can use several vulnerabilities of Digi ConnectPort LTS...
Aruba Intelligent Edge Switches: information disclosure via Web Management Interface
An attacker can bypass access restrictions to data via Web Management Interface of Aruba Intelligent Edge Switches, in order to obtain sensitive information...
Windows: vulnerabilities of February 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of February 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint Server: vulnerabilities of February 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SQL Server: code execution
An attacker can use a vulnerability of Microsoft SQL Server, in order to run code...
Microsoft Exchange Server: vulnerabilities of February 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: vulnerabilities of February 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE: vulnerabilities of February 2020
An attacker can use several vulnerabilities of Microsoft products...
Adobe Flash Player: memory corruption via Type Confusion
An attacker can trigger a memory corruption via Type Confusion of Adobe Flash Player, in order to trigger a denial of service, and possibly to run code...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
SAP: multiple vulnerabilities of February 2020
An attacker can use several vulnerabilities of SAP products...
Node.js hapi/hoek: privilege escalation via Prototype Pollution
An attacker can bypass restrictions via Prototype Pollution of Node.js hapi/hoek, in order to escalate his privileges...
Siemens SIMATIC: denial of service via Encrypted Communication
An attacker can trigger a fatal error via Encrypted Communication of Siemens SIMATIC, in order to trigger a denial of service...
Siemens SIMATIC S7: denial of service via HTTP Requests
An attacker can trigger a fatal error via HTTP Requests of Siemens SIMATIC S7, in order to trigger a denial of service...
Siemens SIMATIC: memory corruption via Profinet UDP Packets
An attacker can trigger a memory corruption via Profinet UDP Packets of Siemens SIMATIC, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1002 1003 1004 1005 1006 1007 1008 1009 1011 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022