The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: memory corruption via usb_destroy_configuration
An attacker can generate a memory corruption via usb_destroy_configuration() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Fossil: code execution via SSH Urls
An attacker can use a vulnerability via SSH Urls of Fossil, in order to run code...
Windows: vulnerabilities of December 2017
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of December 2017
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange Server: vulnerabilities of December 2017
An attacker can use several vulnerabilities of Microsoft products...
Edge: vulnerabilities of December 2017
An attacker can use several vulnerabilities of Microsoft products...
Internet Explorer: vulnerabilities of December 2017
An attacker can use several vulnerabilities of Microsoft products...
Adobe Flash Player: preferences reset
User preferences of Adobe Flash Player can be reset...
LibTIFF: buffer overflow via t2p_write_pdf
An attacker can generate a buffer overflow via t2p_write_pdf() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
Bouncy Castle: information disclosure via ROBOT Attack
An attacker can bypass access restrictions to data via ROBOT Attack (VIGILANCE-VUL-24749) of Bouncy Castle, in order to obtain sensitive information...
TLS: information disclosure via ROBOT Attack
An attacker can bypass access restrictions to data via ROBOT Attack of TLS, in order to obtain sensitive information...
Cisco ACE/ASA: information disclosure via ROBOT Attack
An attacker can bypass access restrictions to data via ROBOT Attack (VIGILANCE-VUL-24749) of Cisco ACE/ASA, in order to obtain sensitive information...
Ceph: assertion error via ceph_assert
An attacker can force an assertion error via ceph_assert() of Ceph, in order to trigger a denial of service...
Ruby YARD: directory traversal via lib/yard/core_ext/file.rb
An attacker can traverse directories via lib/yard/core_ext/file.rb of Ruby YARD, in order to read a file outside the service root path...
SAP: multiples vulnerabilities of December 2017
An attacker can use several vulnerabilities of SAP products...
Synology Surveillance Station: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology Surveillance Station...
Xen: denial of service via X86 Log-dirty
An attacker, inside a guest system, can generate a fatal error via X86 Log-dirty of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via X86 Shadow Mode Refcount Error
An attacker, inside a guest system, can bypass restrictions via X86 Shadow Mode Refcount Error of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via X86 Shadow Mode Refcount
An attacker, inside a guest system, can bypass restrictions via X86 Shadow Mode Refcount of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via X86 PV Guests
An attacker, inside a guest system, can bypass restrictions via X86 PV Guests of Xen, in order to escalate his privileges on the host system...
SimpleSAMLphp: six vulnerabilities
An attacker can use several vulnerabilities of SimpleSAMLphp...
McAfee MOVE AV: information disclosure via Password
An attacker can bypass access restrictions to data via Password of McAfee MOVE AV, in order to obtain sensitive information...
ISC DHCP: denial of service via OMAPI
An attacker can generate a fatal error via OMAPI of ISC DHCP, in order to trigger a denial of service...
Apache Struts: code execution via com.fasterxml.jackson
An attacker can use a vulnerability (VIGILANCE-VUL-23406) of com.fasterxml.jackson of Apache Struts, in order to run code...
PowerDNS Recursor: denial of service via CNAME Answer
An attacker can generate a fatal error via CNAME Answer of PowerDNS Recursor, in order to trigger a denial of service...
Jenkins Script Security: file reading via Groovy
A local attacker can read a file via Groovy of Jenkins Script Security, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 772 773 774 775 776 777 778 779 780 782 784 785 786 787 788 789 790 791 792 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102