The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Google Android/Pixel: multiple vulnerabilities of September 2020
An attacker can use several vulnerabilities of Google Android/Pixel...
Siemens SIMATIC RTLS Locating Manager: privilege escalation
An attacker can bypass restrictions of Siemens SIMATIC RTLS Locating Manager, in order to escalate his privileges...
Siemens SIMATIC S7-300/S7-400: information disclosure via ISO-TSAP Password
An attacker can bypass access restrictions to data via ISO-TSAP Password of Siemens SIMATIC S7-300/S7-400, in order to obtain sensitive information...
Siemens SIMATIC: six vulnerabilities via WIBU Systems CodeMeter Runtime
An attacker can use several vulnerabilities via WIBU Systems CodeMeter Runtime of Siemens SIMATIC...
Siemens SIMATIC HMI: privilege escalation
An attacker can bypass restrictions of Siemens SIMATIC HMI, in order to escalate his privileges...
Vtiger CRM: multiple vulnerabilities
An attacker can use several vulnerabilities of Vtiger CRM...
Node.js bl: information disclosure
A local attacker can read a memory fragment of Node.js bl, in order to obtain sensitive information...
Microsoft Windows: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange Server: code execution
An attacker can use a vulnerability of Microsoft Exchange Server, in order to run code...
Microsoft Office: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft 365 Apps for Enterprise: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft ASP.NET Core: privilege escalation
An attacker can bypass restrictions of Microsoft ASP.NET Core, in order to escalate his privileges...
Microsoft Internet Explorer: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge Chromium: memory corruption via BHO
An attacker can trigger a memory corruption via BHO of Microsoft Edge Chromium, in order to trigger a denial of service, and possibly to run code...
Microsoft Edge EdgeHTML: vulnerabilities of September 2020
An attacker can use several vulnerabilities of Microsoft products...
Go: overload via UTF BOM
An attacker can trigger an overload via UTF BOM of Go, in order to trigger a denial of service...
libcroco: overload via cr_parser_parse_any_core
An attacker can trigger an overload via cr_parser_parse_any_core() of libcroco, in order to trigger a denial of service...
SAP: multiple vulnerabilities of September 2020
An attacker can use several vulnerabilities of SAP products...
Linux kernel: denial of service via xfs_attr_shortform_verify
An attacker can trigger a fatal error via xfs_attr_shortform_verify() of the Linux kernel, in order to trigger a denial of service...
cryptsetup: buffer overflow via segments
An attacker can trigger a buffer overflow via segments of cryptsetup, in order to trigger a denial of service, and possibly to run code...
ZeroMQ: denial of service via CURVE
An attacker can trigger a fatal error via CURVE of ZeroMQ, in order to trigger a denial of service...
LemonLDAP-NG: privilege escalation via Nginx URL Normalization
An attacker can bypass restrictions via Nginx URL Normalization of LemonLDAP::NG, in order to escalate his privileges...
GnuTLS: NULL pointer dereference via Second Handshake No_renegotiation
An attacker can force a NULL pointer to be dereferenced via Second Handshake No_renegotiation of GnuTLS, in order to trigger a denial of service...
libxml2: buffer overflow via xmllint xmlEncodeEntitiesInternal
An attacker can trigger a buffer overflow via xmllint xmlEncodeEntitiesInternal() of libxml2, in order to trigger a denial of service, and possibly to run code...
OpenBSD: buffer overflow via amdgpu ioctl
An attacker can trigger a buffer overflow via amdgpu ioctl of OpenBSD, in order to trigger a denial of service, and possibly to run code...
GNOME Geary: Man-in-the-Middle via Pinned TLS Certificate
An attacker can act as a Man-in-the-Middle via Pinned TLS Certificate on GNOME Geary, in order to read or write data in the session...
GnuPG: memory corruption via Key Import
An attacker can trigger a memory corruption via Key Import of GnuPG, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1057 1058 1059 1060 1061 1062 1063 1064 1065 1067 1069 1070