The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ASA: denial of service via TLS/SSL Driver
An attacker can trigger a fatal error via TLS/SSL Driver of Cisco ASA, in order to trigger a denial of service...
ClusterLabs fence-agents: denial of service via Guest VM Comment
An attacker can trigger a fatal error via Guest VM Comment of ClusterLabs fence-agents, in order to trigger a denial of service...
OpenJPEG: integer overflow via opj_get_encoding_parameters
An attacker can trigger an integer overflow via opj_get_encoding_parameters() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
Redis: buffer overflow via Hyperloglog 3 Bytes
An attacker can trigger a buffer overflow via Hyperloglog of Redis, in order to trigger a denial of service, and possibly to run code...
Joomla Core: code execution via Subform Filter Attribute
An attacker can use a vulnerability via Subform Filter Attribute of Joomla Core, in order to run code...
Siemens SIMATIC PCS7/WinCC: file upload via DataMonitor
An attacker can upload a malicious file via DataMonitor on Siemens SIMATIC PCS7/WinCC, in order for example to upload a Trojan...
WordPress Yoast SEO: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Yoast SEO, in order to run JavaScript code in the context of the web site...
libqb: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of libqb...
AMD Secure Processor: information disclosure via SEV Insecure Cryptography
An attacker can bypass access restrictions to data via SEV Insecure Cryptography of AMD Secure Processor, in order to obtain sensitive information...
VMware ESXi: denial of service via Hostd Failed Login
An attacker, inside a guest system, can trigger a fatal error via Hostd Failed Login of VMware ESXi, in order to trigger a denial of service on the host system...
Windows: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Skype for Business: information disclosure
An attacker can bypass access restrictions to data of Skype for Business, in order to obtain sensitive information...
Microsoft Visual Studio: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SQL Server: code execution
An attacker can use a vulnerability of Microsoft SQL Server, in order to run code...
Microsoft Lync: information disclosure
An attacker can bypass access restrictions to data of Microsoft Lync, in order to obtain sensitive information...
Microsoft Exchange: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET Framework: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of July 2019
An attacker can use several vulnerabilities of Microsoft products...
Mozilla Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird...
Xen: denial of service via Unlimited Grant Table And Foreign Mapping
An attacker, inside a guest system, can trigger a fatal error via Unlimited Grant Table And Foreign Mapping of Xen, in order to trigger a denial of service on the host system...
Mozilla NSS: three vulnerabilities
An attacker can use several vulnerabilities of Mozilla NSS...
Sonatype Nexus Repository Manager: information disclosure via Images Download
An attacker can bypass access restrictions to data via Images Download of Sonatype Nexus Repository Manager, in order to obtain sensitive information...
WordPress Rencontre: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Rencontre...
Spring Security: privilege escalation via PlaintextPasswordEncoder Null Encoded Password
An attacker can bypass restrictions via PlaintextPasswordEncoder Null Encoded Password of Spring Security, in order to escalate his privileges...
Whoopsie: information disclosure via Crash Reports
An attacker can bypass access restrictions to data via Crash Reports of Whoopsie, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 938 939 940 941 942 943 944 945 946 948 950 951 952 953 954 955 956 957 958 961 981 1001 1014