The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft Exchange Server: vulnerabilities of May 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of May 2021
An attacker can use several vulnerabilities of Microsoft products...
Microsoft 365 Apps for Enterprise: vulnerabilities of May 2021
An attacker can use several vulnerabilities of Microsoft products...
Internet Explorer: code execution
An attacker can use a vulnerability of Internet Explorer, in order to run code...
Microsoft .NET Core: privilege escalation
An attacker can bypass restrictions of Microsoft .NET, in order to escalate his privileges...
Synology Router Manager: code execution
An attacker can use a vulnerability of Synology Router Manager, in order to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
SmartVNC: multiple vulnerabilities
An attacker can use several vulnerabilities of SmartVNC...
Siemens SIMATIC WinCC: denial of service via SNMP
An attacker can trigger a fatal error via SNMP of Siemens SIMATIC WinCC, in order to trigger a denial of service...
Siemens SIMATIC NET CP 343-1 Advanced: denial of service via TCP/102
An attacker can send malicious TCP/102 packets to Siemens SIMATIC NET CP 343-1 Advanced, in order to trigger a denial of service...
UltraVNC: multiple vulnerabilities
An attacker can use several vulnerabilities of UltraVNC...
Node.js nodemailer: code execution via Recipient Email
An attacker can use a vulnerability via Recipient Email of Node.js nodemailer, in order to run code...
Node.js grpc-js: read-write access via Prototype Pollution
An attacker can bypass access restrictions via Prototype Pollution of Node.js grpc-js, in order to read or alter data...
Node.js json-ptr: read-write access via Prototype Pollution
An attacker can bypass access restrictions via Prototype Pollution of Node.js json-ptr, in order to read or alter data...
Node.js npm-user-validate: overload via Regular Expression
An attacker can trigger an overload via Regular Expression of Node.js npm-user-validate, in order to trigger a denial of service...
Node.js chart.js: read-write access via Prototype Pollution
An attacker can bypass access restrictions via Prototype Pollution of Node.js chart.js, in order to read or alter data...
Node.js reveal.js: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js reveal.js, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127 1128 1129 1130 1131 1132 1133 1134 1135 1137 1139 1140 1141 1142 1143 1144 1145 1146 1147 1150