The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP: Cross Site Scripting via Fraud Protection Service
An attacker can trigger a Cross Site Scripting via Fraud Protection Service of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
Elasticsearch: information disclosure via emit_request_body
An attacker can bypass access restrictions to data via emit_request_body of Elasticsearch, in order to obtain sensitive information...
RubyGem Mechanize: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of RubyGem Mechanize, in order to run code...
Xpdf: use after free via SplashOutputDev-endType3Char
An attacker can force the usage of a freed memory area via SplashOutputDev::endType3Char() of Xpdf, in order to trigger a denial of service, and possibly to run code...
Xpdf: denial of service via FoFiType1C-getOp
An attacker can trigger a fatal error via FoFiType1C::getOp() of Xpdf, in order to trigger a denial of service...
Open vSwitch: denial of service via IP With Ethernet Padding
An attacker can trigger a fatal error via IP With Ethernet Padding of Open vSwitch, in order to trigger a denial of service...
Microsoft .NET Core: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Dell EMC Avamar Server: read-write access via User Backup Data
An attacker can bypass access restrictions via User Backup Data of Dell EMC Avamar Server, in order to read or alter data...
Apache Subversion: denial of service via mod_authz_svn
An attacker can trigger a fatal error via mod_authz_svn of Apache Subversion, in order to trigger a denial of service...
zstd: file reading via Ongoing Compression
A local attacker can read a file via Ongoing Compression of zstd, in order to obtain sensitive information...
Firejail: privilege escalation via OverlayFS
An attacker can bypass restrictions via OverlayFS of Firejail, in order to escalate his privileges...
xcftools: integer overflow via flattenIncrementally
An attacker can trigger an integer overflow via flattenIncrementally() of xcftools, in order to trigger a denial of service, and possibly to run code...
xcftools: integer overflow via flattenIncrementally
An attacker can trigger an integer overflow via flattenIncrementally() of xcftools, in order to trigger a denial of service, and possibly to run code...
Apple macOS: two vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Ansible Community Package: information disclosure via Logged Parameters
An attacker can bypass access restrictions to data via Logged Parameters of Ansible Community Package (which were named Ansible before version 2.10), in order to obtain sensitive information...
snapd: privilege escalation via Container Arbitrary Devices
An attacker, inside a guest system, can bypass restrictions via Container Arbitrary Devices of snapd, in order to escalate his privileges on the host system...
WebSphere AS: external XML entity injection
An attacker can transmit malicious XML data to WebSphere AS, in order to read a file, scan sites, or trigger a denial of service...
Microsoft Windows: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft System Center Endpoint Protection: privilege escalation
An attacker can bypass restrictions of Microsoft System Center Endpoint Protection, in order to escalate his privileges...
Microsoft SharePoint: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Lync, Skype for Business: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft 365 Apps: vulnerabilities of February 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: denial of service
An attacker can trigger a fatal error of Microsoft .NET Framework, in order to trigger a denial of service...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Magento Commerce/OpenSource: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento Commerce/OpenSource...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1099 1100 1101 1102 1103 1104 1105 1106 1107 1109 1111 1112 1113 1114