The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Junos OS: denial of service via jdhcpd
An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service...
Junos OS MX: denial of service via DNS Filtering
An attacker can trigger a fatal error via DNS Filtering of Junos OS MX, in order to trigger a denial of service...
Junos OS SRX: denial of service via IPSec Spoofed Packets
An attacker can trigger a fatal error via IPSec Spoofed Packets of Junos OS SRX, in order to trigger a denial of service...
Junos OS: code execution via DHCPv6 Relay-Agent
An attacker can use a vulnerability via DHCPv6 Relay-Agent of Junos OS, in order to run code...
Drupal OAuth Server: SQL injection
An attacker can use a SQL injection of Drupal OAuth Server, in order to read or alter data...
WildFly OpenSSL: memory leak via HTTP Session End
An attacker can create a memory leak via HTTP Session End of WildFly OpenSSL, in order to trigger a denial of service...
FasterXML Jackson Databind: external XML entity injection
An attacker can transmit malicious XML data to FasterXML Jackson Databind, in order to read a file, scan sites, or trigger a denial of service...
Percona Server for MySQL: vulnerability
A vulnerability of Percona Server for MySQL was announced...
Apache Shiro: privilege escalation via Crafted HTTP Request
An attacker can bypass restrictions via Crafted HTTP Request of Apache Shiro, in order to escalate his privileges...
Linux kernel: information disclosure via IPsec Unencrypted GENEVE Tunnels
An attacker can bypass access restrictions to data via IPsec Unencrypted GENEVE Tunnels of the Linux kernel, in order to obtain sensitive information...
NetBSD: buffer overflow via USB Network Interface Jumbo Packets
An attacker can trigger a buffer overflow via USB Network Interface Jumbo Packets of NetBSD, in order to trigger a denial of service, and possibly to run code...
McAfee ePolicy Orchestrator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of McAfee ePolicy Orchestrator, in order to run JavaScript code in the context of the web site...
McAfee Application and Change Control: privilege escalation via Installer Package Control
An attacker can bypass restrictions via Installer Package Control of McAfee Application and Change Control, in order to escalate his privileges...
Ansible Community Package: information disclosure via Community.crypto Logged Private Key
An attacker can bypass access restrictions to data via Community.crypto Logged Private Key of Ansible Community Package, in order to obtain sensitive information...
BlackBerry UEM: denial of service via UEM Core
An attacker can trigger a fatal error via UEM Core of BlackBerry UEM, in order to trigger a denial of service...
crmsh: information disclosure via ui_configure
An attacker can bypass access restrictions to data via ui_configure of crmsh, in order to obtain sensitive information...
Microsoft PowerShell: privilege escalation via PowerShellGet Module WDAC Bypass
An attacker can bypass restrictions via PowerShellGet Module WDAC Bypass of Microsoft PowerShell, in order to escalate his privileges...
Microsoft Windows: vulnerabilities of October 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange: information disclosure
An attacker can bypass access restrictions to data of Microsoft Exchange, in order to obtain sensitive information...
Microsoft 365 Apps for Enterprise: vulnerabilities of October 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint: vulnerabilities of October 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of October 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: information disclosure
An attacker can bypass access restrictions to data of Microsoft .NET Framework, in order to obtain sensitive information...
Apache Derby: privilege escalation via Database Boot
An attacker can bypass restrictions via Database Boot of Apache Derby, in order to escalate his privileges...
Adobe Flash Player: code execution via Pointer Dereference
An attacker can use a vulnerability via Pointer Dereference of Adobe Flash Player, in order to run code...
XNIO: denial of service via File Descriptor Leak
An attacker can trigger a fatal error via File Descriptor Leak of XNIO, in order to trigger a denial of service...
PicketBox: privilege escalation via Admin-only Mode Reload
An attacker can bypass restrictions via Admin-only Mode Reload of PicketBox, in order to escalate his privileges...
Linux kernel: use after free via DCCP CCID
An attacker can force the usage of a freed memory area via DCCP CCID of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: file reading via Overlayfs Unprivileged User Namespaces
A local attacker can read a file via Overlayfs Unprivileged User Namespaces of the Linux kernel, in order to obtain sensitive information...
IBM MQ Appliance: information disclosure via Log Files
An attacker can bypass access restrictions to data via Log Files of IBM MQ Appliance, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1066 1067 1068 1069 1070 1071 1072 1073 1074 1076 1078 1079 1080 1081 1082 1083 1084 1085 1086 1101 1116