The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mozilla Thunderbird: information disclosure via X-Frame-Options
An attacker can bypass access restrictions to data via X-Frame-Options of Mozilla Thunderbird, in order to obtain sensitive information...
Microsoft Edge Chromium: code execution via DLL
An attacker can use a vulnerability via DLL of Microsoft Edge Chromium, in order to run code...
WebSphere AS: code execution via SOAP Serialized Objects
An attacker can use a vulnerability via SOAP Serialized Objects of WebSphere AS, in order to run code...
bashtop: multiple vulnerabilities
An attacker can use several vulnerabilities of bashtop...
ClamAV: three vulnerabilities
An attacker can use several vulnerabilities of ClamAV...
Xen/Linux: read-write access via IO Ports
An attacker, inside a guest system, can bypass access restrictions via IO Ports of Xen/Linux, in order to read or alter data on the host system...
Synology DSM: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Synology DSM, in order to read or write data in the session...
Cisco SD-WAN Solution Software: privilege escalation
An attacker can bypass restrictions of Cisco SD-WAN Solution Software, in order to escalate his privileges...
Cisco SD-WAN vEdge Router: denial of service via DPI
An attacker can trigger a fatal error via DPI of Cisco SD-WAN vEdge Router, in order to trigger a denial of service...
Cisco SD-WAN Solution Software: denial of service via Encapsulated Peering Messages
An attacker can trigger a fatal error via Encapsulated Peering Messages of Cisco SD-WAN Solution Software, in order to trigger a denial of service...
Cisco SD-WAN Solution Software: privilege escalation via Static Password
An attacker can bypass restrictions via Static Password of Cisco SD-WAN Solution Software, in order to escalate his privileges...
Cisco SD-WAN vEdge Router: denial of service via DPI
An attacker can trigger a fatal error via DPI of Cisco SD-WAN vEdge Router, in order to trigger a denial of service...
Cisco Email Security Appliance: privilege escalation via Bypass URL Filtering
An attacker can bypass restrictions via Bypass URL Filtering of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco Data Center Network Manager, in order to escalate his privileges...
Go: denial of service via Expect 100-continue Header
An attacker can trigger a fatal error via Expect 100-continue Header of Go, in order to trigger a denial of service...
Linux kernel: privilege escalation via acpi_configfs.c
An attacker can bypass restrictions via acpi_configfs.c of the Linux kernel, in order to escalate his privileges...
Evolution data server: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Evolution data server, in order to read or write data in the session...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
OpenBSD: denial of service via tty
An attacker can trigger a fatal error via tty of OpenBSD, in order to trigger a denial of service...
snapd: privilege escalation via XDG_DATA_DIRS
An attacker can bypass restrictions via XDG_DATA_DIRS of snapd, in order to escalate his privileges...
Jenkins Core: six vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core...
snapd: privilege escalation via cloud-init user-data/meta-data
An attacker can bypass restrictions via cloud-init user-data/meta-data of snapd, in order to escalate his privileges...
Jenkins Plugins: three vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Kubernetes: privilege escalation via kube-apiserver
An attacker can bypass restrictions via kube-apiserver of Kubernetes, in order to escalate his privileges...
Kubernetes: denial of service via kubelet /etc/hosts
An attacker can trigger a fatal error via kubelet /etc/hosts of Kubernetes, in order to trigger a denial of service...
Joomla Core: six vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1043 1044 1045 1046 1047 1048 1049 1050 1051 1053 1055 1056 1057 1058 1059 1060