The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Red Hat JBoss EAP: three vulnerabilities
An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform...
WebKit: use after free
An attacker can force the usage of a freed memory area in WebKit, in order to trigger a denial of service, and possibly to run code...
OpenBSD: denial of service via UDP muticast
A local attacker can trigger an OpenBSD kernel panic by multicasting UDP traffic, in order to trigger a denial of service...
sympa: denial of service via CSRF countermeasures
An attacker can trigger an overuse of system resources by sympa, typically by tampering with the anti CSRF token, in order to trigger a denial of service...
yubikey-val: two vulnerabilities
An attacker can use several vulnerabilities of yubikey-val...
Palo Alto PAN-OS: three vulnerabilities
An attacker can use several vulnerabilities of Palo Alto PAN-OS...
Ansible Core: privilege escalation via wrong creation of user directory
An attacker can control a user dedicated folder that should be created by Ansible Core, in order to escalate his privileges...
Drupal SAML Service Provider: privilege escalation
An attacker can bypass restrictions of Drupal SAML Service Provider, in order to escalate his privileges...
dojo: memory corruption via Prototype Pollution
An attacker can trigger a memory corruption via Prototype Pollution of dojo, in order to trigger a denial of service, and possibly to run code...
sleuthkit: buffer overflow via yaffsfs_istat
An attacker can trigger a buffer overflow via yaffsfs_istat() of sleuthkit, in order to trigger a denial of service, and possibly to run code...
wpa: information disclosure via bad random in cryptography
An attacker can bypass access restrictions to data because iof the use of bad random data in wpa, in order to obtain sensitive information...
Joomla Core: six vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Fortinet FortiManager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Fortinet FortiManager, in order to run JavaScript code in the context of the web site...
Microsoft Windows: code execution via SMBv3
An attacker can use a vulnerability via SMBv3 of Microsoft Windows, in order to run code...
Siemens SIMATIC S7-300: denial of service
An attacker can send malicious packets to Siemens SIMATIC S7-300, in order to trigger a denial of service...
Xen: information disclosure via a side channel
An attacker, inside a guest system, can bypass the virtual memory barriers via a side channel in Xen, in order to get sensitive information from the host system or others guests...
Puppet: information disclosure
An attacker can bypass access restrictions to data of Puppet, in order to obtain sensitive information...
OpenBSD: denial of service via sysctl
An attacker can trigger a fatal error via sysctl of OpenBSD, in order to trigger a denial of service...
NetBSD: denial of service via ICMPv6
An attacker can send malicious ICMPv6 packets to NetBSD, in order to trigger a denial of service...
Windows: vulnerabilities of March 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint Enterprise Server: vulnerabilities of March 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of March 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange Server: spoofing
An attacker can create spoofed data of Microsoft Exchange Server, in order to deceive the victim...
Microsoft Edge EdgeHTML: vulnerabilities of March 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE: vulnerabilities of March 2020
An attacker can use several vulnerabilities of Microsoft products...
SQLite: three vulnerabilities
An attacker can use several vulnerabilities of SQLite...
Mozilla Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
TYPO3 Extensions: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Extensions...
SAP: multiple vulnerabilities of March 2020
An attacker can use several vulnerabilities of SAP products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1006 1007 1008 1009 1010 1011 1012 1013 1014 1016 1018 1019 1020 1021 1022 1023 1024 1025 1026 1041 1049