The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Trend Micro InterScan Web Security Virtual Appliance: four vulnerabilities
An attacker can use several vulnerabilities of Trend Micro InterScan Web Security Virtual Appliance...
Micro Focus ArcSight Logger: three vulnerabilities
An attacker can use several vulnerabilities of Micro Focus ArcSight Logger...
MediaArea MediaInfo: out-of-bounds memory reading via Streams_Fill_PerStream
An attacker can force a read at an invalid address via Streams_Fill_PerStream() of MediaArea MediaInfo, in order to trigger a denial of service, or to obtain sensitive information...
Node Core: denial of service via Numerous DNS Responses
An attacker can trigger a fatal error via Numerous DNS Responses of Node Core, in order to trigger a denial of service...
Intel Wireless Bluetooth: two vulnerabilities
An attacker can use several vulnerabilities of Intel Wireless Bluetooth...
DNS: Man-in-the-Middle via SAD DNS ICMP Rate
An attacker can act as a Man-in-the-Middle via ICMP Rate on DNS, in order to read or write data in the session...
LibVNCServer: denial of service via Divide By Zero
An attacker can trigger a fatal error via Divide By Zero of LibVNCServer, in order to trigger a denial of service...
Apple macOS 11: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS 11...
PostgreSQL: three vulnerabilities
An attacker can use several vulnerabilities of PostgreSQL...
Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Palo Alto PAN-OS: privilege escalation via GlobalProtect SSL VPN Client Certificate Verification
An attacker can bypass restrictions via GlobalProtect SSL VPN Client Certificate Verification of Palo Alto PAN-OS, in order to escalate his privileges...
Palo Alto PAN-OS: information disclosure via Proxy Passwords
An attacker can bypass access restrictions to data via Proxy Passwords of Palo Alto PAN-OS, in order to obtain sensitive information...
Palo Alto PAN-OS: information disclosure via Context Switch Session Token
An attacker can bypass access restrictions to data via Context Switch Session Token of Palo Alto PAN-OS, in order to obtain sensitive information...
Palo Alto PAN-OS: privilege escalation via Management Web Interface
An attacker can bypass restrictions via Management Web Interface of Palo Alto PAN-OS, in order to escalate his privileges...
Palo Alto PAN-OS: privilege escalation via Threat Signatures Bypass
An attacker can bypass restrictions via Threat Signatures Bypass of Palo Alto PAN-OS, in order to escalate his privileges...
Intel Processors: privilege escalation via Platform Sample Code
An attacker can bypass restrictions via Platform Sample Code of Intel Processors, in order to escalate his privileges...
Intel Processors: multiple vulnerabilities via BIOS
An attacker can use several vulnerabilities via BIOS of Intel Processors...
Intel Processors: multiple vulnerabilities via CSME/SPS/TXE/AMT/DAL
An attacker can use several vulnerabilities via CSME/SPS/TXE/AMT/DAL of Intel Processors...
Linux kernel: denial of service via kmem_cache_alloc_bulk
An attacker can trigger a fatal error via kmem_cache_alloc_bulk() of the Linux kernel, in order to trigger a denial of service...
Chrome: vulnerability via Base Implementation
A vulnerability via Base Implementation of Chrome was announced...
Xen: information disclosure via Power Interfaces Weak Access
An attacker, inside a guest system, can bypass access restrictions to data via Power Interfaces Weak Access of Xen, in order to obtain sensitive information on the host system...
Apache OpenOffice: code execution via Hyperlink To Local Executable
An attacker can use a vulnerability via Hyperlink To Local Executable of Apache OpenOffice, in order to run code...
Linux kernel: out-of-bounds memory reading via skb_headlen
An attacker can force a read at an invalid address via skb_headlen() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Intel Processors: information disclosure
An attacker can bypass access restrictions to data of Intel Processors, in order to obtain sensitive information...
Python Waitress: information disclosure via HTTP Request Smuggling
An attacker can bypass access restrictions to data via HTTP Request Smuggling of Python Waitress, in order to obtain sensitive information...
Windows: vulnerabilities of November 2020
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: information disclosure via Tampering
An attacker can bypass access restrictions to data via Tampering of Microsoft Visual Studio, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1077 1078 1079 1080 1081 1082 1083 1084 1085 1087 1089