The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Dell EMC OpenManage Integration for Microsoft: two vulnerabilities
An attacker can use several vulnerabilities of Dell EMC OpenManage Integration for Microsoft...
Oracle VM VirtualBox: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Oracle Java, OpenJDK: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Oracle Fusion Middleware: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Oracle Communications: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Oracle Berkeley DB: privilege escalation via Data Store
An attacker can bypass restrictions via Data Store of Oracle Berkeley DB, in order to escalate his privileges...
Oracle Database: vulnerabilities of July 2020
Several vulnerabilities were announced in Oracle products...
Microsoft Windows: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Lync/Skype Server: privilege escalation
An attacker can bypass restrictions of Microsoft Lync Server 2013, in order to escalate his privileges...
Microsoft Forefront Endpoint Protection 2010, Microsoft System Center Endpoint Protection: privilege escalation
An attacker can bypass restrictions of Microsoft Forefront Endpoint Protection 2010, Microsoft System Center Endpoint Protection, in order to escalate his privileges...
Microsoft 365 Apps for Enterprise: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: code execution
An attacker can use a vulnerability of Microsoft .NET Framework, in order to run code...
Microsoft IE: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: vulnerabilities of July 2020
An attacker can use several vulnerabilities of Microsoft products...
SIMATIC: information disclosure via Clear Text Transmission
An attacker can bypass access restrictions to data via Clear Text Transmission of SIMATIC, in order to obtain sensitive information...
SIMATIC: denial of service via Incomming Connection
An attacker can trigger a fatal error via Incomming Connection of SIMATIC, in order to trigger a denial of service...
SIMATIC: multiple vulnerabilities via UMC Stack
An attacker can use several vulnerabilities via UMC Stack of SIMATIC...
McAfee Web Gateway: open redirect
An attacker can deceive the user of McAfee Web Gateway, in order to redirect him to a malicious site...
openSUSE: privilege escalation via hylafax
An attacker can bypass restrictions via hylafax of openSUSE, in order to escalate his privileges...
IBM QRadar SIEM: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of IBM QRadar SIEM, in order to run code...
IBM QRadar SIEM: external XML entity injection
An attacker can transmit malicious XML data to IBM QRadar SIEM, in order to read a file, scan sites, or trigger a denial of service...
IBM QRadar SIEM: denial of service via qflow sflow
An attacker can trigger a fatal error via qflow sflow of IBM QRadar SIEM, in order to trigger a denial of service...
IBM QRadar SIEM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1052 1054 1055 1056 1057 1058 1059 1060