The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft IE: vulnerabilities of March 2020
An attacker can use several vulnerabilities of Microsoft products...
SQLite: three vulnerabilities
An attacker can use several vulnerabilities of SQLite...
Mozilla Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
TYPO3 Extensions: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Extensions...
SAP: multiple vulnerabilities of March 2020
An attacker can use several vulnerabilities of SAP products...
gd: information disclosure via gdImageCreateFromXbm
An attacker can bypass access restrictions to data via gdImageCreateFromXbm() of gd, in order to obtain sensitive information...
network-manager-ssh: privilege escalation
An attacker can bypass restrictions of network-manager-ssh, in order to escalate his privileges...
libvpx: buffer overflow
An attacker can trigger a buffer overflow of libvpx, in order to trigger a denial of service...
Jenkins plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins plugins...
IBM Tivoli Workload Scheduler: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM Tivoli Workload Scheduler, in order to run JavaScript code in the context of the web site...
Node.js acorn: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Node.js acorn, in order to trigger a denial of service...
ESET NOD32 Antivirus: privilege escalation via RAR Archive Bypass
An attacker can bypass restrictions via RAR Archive Bypass of ESET NOD32 Antivirus, in order to escalate his privileges...
GNOME librsvg: overload via xml.rs
An attacker can trigger an overload via xml.rs of GNOME librsvg, in order to trigger a denial of service...
eZ Systems eZ Platform: Cross Site Scripting via User Preferences
An attacker can trigger a Cross Site Scripting via User Preferences of eZ Systems eZ Platform, in order to run JavaScript code in the context of the web site...
ISC BIND: overload via TCP Client Quota Limits
An attacker can trigger an overload via TCP Client Quota Limits of ISC BIND, in order to trigger a denial of service...
FasterXML jackson-databind: code execution via anteros-core
An attacker can use a vulnerability via anteros-core of FasterXML jackson-databind, in order to run code...
FasterXML jackson-databind: code execution via ibatis-sqlmap
An attacker can use a vulnerability via ibatis-sqlmap of FasterXML jackson-databind, in order to run code...
FasterXML jackson-databind: code execution via hikari-config
An attacker can use a vulnerability via hikari-config of FasterXML jackson-databind, in order to run code...
PDFResurrect: buffer overflow via get_type
An attacker can trigger a buffer overflow via get_type() of PDFResurrect, in order to trigger a denial of service, and possibly to run code...
Drupal SVG Formatter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal SVG Formatter, in order to run JavaScript code in the context of the web site...
QEMU: memory leak via VNC Disconnect
An attacker, inside a guest system, can create a memory leak via VNC Disconnect of QEMU, in order to trigger a denial of service on the host system...
openfortivpn: three vulnerabilities
An attacker can use several vulnerabilities of openfortivpn...
Cisco IOS XR: overload via IPsec Packet Processor
An attacker can trigger an overload via IPsec Packet Processor of Cisco IOS XR, in order to trigger a denial of service...
Cisco ESA: overload via AMP
An attacker can trigger an overload via AMP of Cisco ESA, in order to trigger a denial of service...
Cisco AsyncOS: overload via HTTP Request Headers
An attacker can trigger an overload via HTTP Request Headers of Cisco AsyncOS, in order to trigger a denial of service...
NTP.org: three vulnerabilities
An attacker can use several vulnerabilities of NTP.org...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1006 1007 1008 1009 1010 1011 1012 1013 1014 1016 1018 1019 1020 1021 1022