The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft Office: vulnerabilities of April 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of April 2019
An attacker can use several vulnerabilities of Microsoft products...
Adobe Shockwave Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Shockwave Player...
Adobe Flash Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Node.js harp: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js harp, in order to run JavaScript code in the context of the web site...
SAP: multiples vulnerabilities of April 2019
An attacker can use several vulnerabilities of SAP products...
Contao: privilege escalation via Opt-in Tokens
An attacker can bypass restrictions via Opt-in Tokens of Contao, in order to escalate his privileges...
Contao: privilege escalation via Request Token
An attacker can bypass restrictions via Request Token of Contao, in order to escalate his privileges...
Contao: privilege escalation via Valid Session After Password Change
An attacker can bypass restrictions via Valid Session After Password Change of Contao, in order to escalate his privileges...
Symantec Endpoint Encryption: privilege escalation
An attacker can bypass restrictions of Symantec Endpoint Encryption, in order to escalate his privileges...
Siemens SIMATIC: denial of service via Webserver
An attacker can trigger a fatal error via Webserver of Siemens SIMATIC, in order to trigger a denial of service...
Siemens SIMATIC: denial of service via OPC UA 4840/tcp
An attacker can send malicious OPC UA 4840/tcp packets to Siemens SIMATIC, in order to trigger a denial of service...
IBM Spectrum Protect: information disclosure via Plain Text Password
An attacker can bypass access restrictions to data via Plain Text Password of IBM Spectrum Protect, in order to obtain sensitive information...
IBM Spectrum Protect: privilege escalation via Client Web Interface Clickjacking
An attacker can bypass restrictions via Client Web Interface Clickjacking of IBM Spectrum Protect, in order to escalate his privileges...
IBM Spectrum Protect: information disclosure via Password Exposure
An attacker can bypass access restrictions to data via Password Exposure of IBM Spectrum Protect, in order to obtain sensitive information...
Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
SPIP: code execution via ecrire var_memotri
An attacker can use a vulnerability via ecrire var_memotri of SPIP, in order to run code...
ProFTPD: memory leak via mod_sftp
An attacker can create a memory leak via mod_sftp of ProFTPD, in order to trigger a denial of service...
ProFTPD: memory leak via mod_facl
An attacker can create a memory leak via mod_facl of ProFTPD, in order to trigger a denial of service...
systemd: privilege escalation via PAM Module PolicyKit Spoofing
An attacker can bypass restrictions via PAM Module PolicyKit Spoofing of systemd, in order to escalate his privileges...
Check Point IPSec VPN: privilege escalation via IKEv2 Tunnel
An attacker can bypass restrictions via IKEv2 Tunnel of Check Point IPSec VPN, in order to escalate his privileges...
Samba: directory traversal via Symlink
An attacker can traverse directories via Symlink of Samba, in order to create a file outside the service root path...
Samba: privilege escalation via AD DC World Writable Private Directory
An attacker can bypass restrictions via AD DC World Writable Private Directory of Samba, in order to escalate his privileges...
Trend Micro InterScan Web Security Virtual Appliance: information disclosure via Administrator Credential
An attacker can bypass access restrictions to data via Administrator Credential of Trend Micro InterScan Web Security Virtual Appliance, in order to obtain sensitive information...
Trend Micro OfficeScan: directory traversal
An attacker can traverse directories of Trend Micro OfficeScan, in order to alter a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 913 914 915 916 917 918 919 920 921 923 925 926 927 928 929 930 931 932 933 941 961 981 1001 1021 1041 1061 1081 1101 1116