The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft SharePoint Server: vulnerabilities of November 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange Server: vulnerabilities of November 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of November 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge EdgeHTML: vulnerabilities of November 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Internet Explorer: vulnerabilities of November 2020
An attacker can use several vulnerabilities of Microsoft products...
Intel Processors: information disclosure via Running Average Power Limit
An attacker can bypass access restrictions to data via Running Average Power Limit of Intel Processors, in order to obtain sensitive information...
libmaxminddb: out-of-bounds memory reading via dump_entry_data_list
An attacker can force a read at an invalid address via dump_entry_data_list() of libmaxminddb, in order to trigger a denial of service, or to obtain sensitive information...
Cisco ASR 9000: denial of service via Slow Path Forwarding
An attacker can trigger a fatal error via Slow Path Forwarding of Cisco ASR 9000, in order to trigger a denial of service...
SIMATIC S7-300: denial of service via Port 102 Packets
An attacker can trigger a fatal error via Port 102 Packets of SIMATIC S7-300, in order to trigger a denial of service...
Citrix Virtual Apps and Desktops: two vulnerabilities
An attacker can use several vulnerabilities of Citrix Virtual Apps and Desktops...
SAP: multiple vulnerabilities of November 2020
An attacker can use several vulnerabilities of SAP products...
rpki-client: denial of service via Manifest Validity Interval
An attacker can trigger a fatal error via Manifest Validity Interval of rpki-client, in order to trigger a denial of service...
OpenBSD: denial of service via Unwind Large DNS Replies
An attacker can trigger a fatal error via Unwind Large DNS Replies of OpenBSD, in order to trigger a denial of service...
Python moin: code execution via Cache Action
An attacker can use a vulnerability via Cache Action of Python moin, in order to run code...
Python moin: Cross Site Scripting via SVG Attachments
An attacker can trigger a Cross Site Scripting via SVG Attachments of Python moin, in order to run JavaScript code in the context of the web site...
X Server: privilege escalation via /tmp/.X11-unix
An attacker can bypass restrictions via /tmp/.X11-unix of X Server, in order to escalate his privileges...
Node.js scratch-svg-renderer: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js scratch-svg-renderer, in order to run JavaScript code in the context of the web site...
Firefox/Thunderbird: use after free via MCallGetProperty
An attacker can force the usage of a freed memory area via MCallGetProperty of Firefox, in order to trigger a denial of service, and possibly to run code...
Das U-Boot: multiple vulnerabilities
An attacker can use several vulnerabilities of Das U-Boot...
Das U-Boot: information disclosure via gen_rand_uuid
An attacker can bypass access restrictions to data via gen_rand_uuid() of Das U-Boot, in order to obtain sensitive information...
Das U-Boot: buffer overflow via Ext4 64-bit Extension
An attacker can trigger a buffer overflow via Ext4 64-bit Extension of Das U-Boot, in order to trigger a denial of service, and possibly to run code...
Sympa: privilege escalation via sympa_newaliases-wrapper
An attacker can bypass restrictions via sympa_newaliases-wrapper of Sympa, in order to escalate his privileges...
Linux kernel: out-of-bounds memory reading via fbcon_copy_font
An attacker can force a read at an invalid address via fbcon_copy_font() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: memory leak via perf_event_parse_addr_filter
An attacker can create a memory leak via perf_event_parse_addr_filter() of the Linux kernel, in order to trigger a denial of service...
Joomla Publisher: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Publisher, in order to run JavaScript code in the context of the web site...
SUSE yast2-multipath: file corruption via Static Temporary Filename
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of SUSE yast2-multipath...
libtpms: buffer overflow via Filename Creation
An attacker can trigger a buffer overflow via Filename Creation of libtpms, in order to trigger a denial of service, and possibly to run code...
libexif: buffer overflow via Compiler Optimization
An attacker can trigger a buffer overflow via Compiler Optimization of libexif, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1076 1077 1078 1079 1080 1081 1082 1083 1084 1086 1088 1089