The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle VM VirtualBox: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
Oracle Java, OpenJDK: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
Oracle Fusion Middleware: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
Oracle Database: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
Git: privilege escalation via Newline URL
An attacker can bypass restrictions via Newline URL of Git, in order to escalate his privileges...
SIMATIC: denial of service via VxWorks SegmentSmack
An attacker can trigger a fatal error via VxWorks SegmentSmack of SIMATIC, in order to trigger a denial of service...
SIMATIC: denial of service via Interniche SegmentSmack
An attacker can trigger a fatal error via Interniche SegmentSmack of SIMATIC, in order to trigger a denial of service...
Windows: vulnerabilities of April 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: vulnerabilities of April 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint Server: vulnerabilities of April 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Forefront / System Center Endpoint Protection: privilege escalation
An attacker can bypass restrictions of Microsoft Forefront / System Center Endpoint Protection, in order to escalate his privileges...
Microsoft Office: vulnerabilities of April 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Internet Explorer: vulnerabilities of April 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: vulnerabilities of April 2020
An attacker can use several vulnerabilities of Microsoft products...
IBM QRadar SIEM: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM QRadar SIEM...
Stormshield Network Security: three vulnerabilities
An attacker can use several vulnerabilities of Stormshield Network Security...
SAP: multiple vulnerabilities of April 2020
An attacker can use several vulnerabilities of SAP products...
Xen: denial of service via GNTTABOP_copy
An attacker, inside a guest system, can trigger a fatal error via GNTTABOP_copy() of Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via GNTTABOP_map_grant
An attacker, inside a guest system, can trigger a fatal error via GNTTABOP_map_grant() of Xen, in order to trigger a denial of service on the host system...
Xen: information disclosure via Read-write Unlock Paths
An attacker, inside a guest system, can bypass access restrictions to data via Read-write Unlock Paths of Xen, in order to obtain sensitive information on the host system...
Xen: information disclosure via xenoprof
An attacker, inside a guest system, can bypass access restrictions to data via xenoprof of Xen, in order to obtain sensitive information on the host system...
jQuery Core: Cross Site Scripting via HtmlPrefilter Regex
An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site...
Joomla GMapFP: vulnerability
A vulnerability of Joomla GMapFP was announced...
Nagios NRPE: buffer overflow via Small Negative Number
An attacker can trigger a buffer overflow via Small Negative Number of Nagios NRPE, in order to trigger a denial of service, and possibly to run code...
Nagios NRPE: code execution via nasty_metachars
An attacker can use a vulnerability via nasty_metachars() of Nagios NRPE, in order to run code...
Linux kernel: privilege escalation via Power9 KUAP Save/Restore
An attacker can bypass restrictions via Power9 KUAP Save/Restore of the Linux kernel, in order to escalate his privileges...
openSUSE: privilege escalation via Icinga Group Permissions
An attacker can bypass restrictions via Icinga Group Permissions of openSUSE, in order to escalate his privileges...
mgetty: out-of-bounds memory reading via putwhitespan
An attacker can force a read at an invalid address via putwhitespan() of mgetty, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1015 1016 1017 1018 1019 1020 1021 1022 1023 1025 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036