The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft Forefront/System-Center Endpoint Protection: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Forefront/System-Center Endpoint Protection...
Microsoft Office: vulnerabilities of June 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft 365 Apps for Enterprise: vulnerabilities of June 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Internet Explorer: vulnerabilities of June 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge Chromium: spoofing
An attacker can create spoofed data of Microsoft Edge Chromium, in order to deceive the victim...
Microsoft Edge EdgeHTML: vulnerabilities of June 2020
An attacker can use several vulnerabilities of Microsoft products...
SIMATIC: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC...
SIMATIC: code execution via Windows exe_ Extension
An attacker can use a vulnerability via Windows exe_ Extension of SIMATIC, in order to run code...
VMware ESXi/Workstation: information disclosure via NVMe
A local attacker can read a memory fragment via NVMe of VMware ESXi/Workstation, in order to obtain sensitive information...
FreeBSD: memory corruption via USB Human Interface Device
An attacker can trigger a memory corruption via USB Human Interface Device of FreeBSD, in order to trigger a denial of service, and possibly to run code...
Intel Processors: information disclosure via Special Register Buffer Data Sampling
An attacker can bypass access restrictions to data via Special Register Buffer Data Sampling of Intel Processors, in order to obtain sensitive information...
Adobe Flash Player: code execution
An attacker can use a vulnerability of Adobe Flash Player, in order to run code...
SAP: multiple vulnerabilities of June 2020
An attacker can use several vulnerabilities of SAP products...
LibreOffice: write access via XForms Submissions
An attacker can bypass access restrictions via XForms Submissions of LibreOffice, in order to alter a local file...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1030 1031 1032 1033 1034 1035 1036 1037 1038 1040 1042 1043 1044 1045 1046 1047 1048 1049