The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PostgreSQL: code execution via Search Path Element
An attacker can use a vulnerability via Search Path Element of PostgreSQL, in order to run code...
Apache Struts: denial of service via Read Only Upload
An attacker can trigger a fatal error via Read Only Upload of Apache Struts, in order to trigger a denial of service...
Apache Struts: code execution via Double OGNL Evaluation
An attacker can use a vulnerability via Double OGNL Evaluation of Apache Struts, in order to run code...
PAN-OS: information disclosure via SSL/TLS Forward Proxy Decryption URL Filtering Bypass
An attacker can bypass access restrictions to data via SSL/TLS Forward Proxy Decryption URL Filtering Bypass of PAN-OS, in order to obtain sensitive information...
WebSphere AS: code execution via Serialized Objects
An attacker can use a vulnerability via Serialized Objects of WebSphere AS, in order to run code...
HylaFAX+: privilege escalation via Scripts In Writable Directories
An attacker can bypass restrictions via Scripts In Writable Directories of HylaFAX+, in order to escalate his privileges...
HylaFAX+: privilege escalation via Chown
An attacker can bypass restrictions via Chown of HylaFAX+, in order to escalate his privileges...
Wireshark: denial of service via Kafka Dissector
An attacker can trigger a fatal error via Kafka Dissector of Wireshark, in order to trigger a denial of service...
Jenkins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins...
Dovecot IMAP server: denial of service via RPA Authentication Message
An attacker can trigger a fatal error via RPA Authentication Message of Dovecot IMAP server, in order to trigger a denial of service...
Dovecot IMAP server: out-of-bounds memory reading via NTLM Package
An attacker can force a read at an invalid address via NTLM Package of Dovecot IMAP server, in order to trigger a denial of service, or to obtain sensitive information...
Dovecot IMAP server: overload via Nested MIME
An attacker can trigger an overload via Nested MIME of Dovecot IMAP server, in order to trigger a denial of service...
Software Properties: spoofing via PPA Descriptions
An attacker can create spoofed data via PPA Descriptions of Software Properties, in order to deceive the victim...
Node.js progress/kendo-angular-editor: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js progress/kendo-angular-editor, in order to run JavaScript code in the context of the web site...
Node.js serialize-javascript: code execution via deleteFunctions
An attacker can use a vulnerability via deleteFunctions of Node.js serialize-javascript, in order to run code...
Microsoft ASP.NET Core: denial of service
An attacker can trigger a fatal error of Microsoft ASP.NET Core, in order to trigger a denial of service...
Roundcube: Cross Site Scripting via Svg Math
An attacker can trigger a Cross Site Scripting via Svg Math of Roundcube, in order to run JavaScript code in the context of the web site...
Microsoft Windows: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: denial of service
An attacker can trigger a fatal error of Microsoft Visual Studio, in order to trigger a denial of service...
Microsoft SharePoint: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft 365 Apps for Enterprise: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Internet Explorer: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: vulnerabilities of August 2020
An attacker can use several vulnerabilities of Microsoft products...
libmetalink: NULL pointer dereference via initial_state_start_fun
An attacker can force a NULL pointer to be dereferenced via initial_state_start_fun() of libmetalink, in order to trigger a denial of service...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
SAP: multiple vulnerabilities of August 2020
An attacker can use several vulnerabilities of SAP products...
Nexus Repository Manager: privilege escalation via Access Controls Bypass
An attacker can bypass restrictions via Access Controls Bypass of Nexus Repository Manager, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050 1051 1052 1053 1054 1055 1056 1057 1058 1060 1062 1063 1064 1065 1066 1067 1068 1069 1070