The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Red Hat Single Sign-On: two vulnerabilities
An attacker can use several vulnerabilities of Red Hat Single Sign-On...
Windows: vulnerabilities of August 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Visual Studio: privilege escalation via Git
An attacker can bypass restrictions via Git of Microsoft Visual Studio, in order to escalate his privileges...
Microsoft SharePoint: vulnerabilities of August 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of August 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Forefront Endpoint Protection 2010, Microsoft System Center Endpoint Protection: privilege escalation via MpSigStub.exe
An attacker can bypass restrictions via MpSigStub.exe of Microsoft Forefront Endpoint Protection 2010 or Microsoft System Center Endpoint Protection, in order to escalate his privileges...
Microsoft IE/Edge: vulnerabilities of August 2019
An attacker can use several vulnerabilities of Microsoft products...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
SAP: multiple vulnerabilities of August 2019
An attacker can use several vulnerabilities of SAP products...
Ignite Openfire: Cross Site Scripting via setup test page
An attacker can trigger a Cross Site Scripting via setup test page of Ignite Openfire, in order to run JavaScript code in the context of the web site...
Joomla JS Support Ticket: SQL injection
An attacker can use a SQL injection of Joomla JS Support Ticket, in order to read or alter data...
Joomla JS Support Ticket: directory traversal
An attacker can traverse directories of Joomla JS Support Ticket, in order to read a file outside the service root path...
Poppler: denial of service via SplashOutputDev-tilingPatternFill
An attacker can trigger a fatal error via SplashOutputDev::tilingPatternFill() of Poppler, in order to trigger a denial of service...
Zstandard: buffer overflow via One-pass Compression
An attacker can trigger a buffer overflow via One-pass Compression of Zstandard, in order to trigger a denial of service, and possibly to run code...
Open Build Service osc: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Open Build Service osc, in order to read or write data in the session...
PAM U2F: information disclosure via File Descriptor
An attacker can bypass access restrictions to data via File Descriptor of PAM U2F, in order to obtain sensitive information...
Poppler: integer overflow via JPXStream-init
An attacker can trigger an integer overflow via JPXStream::init() of Poppler, in order to trigger a denial of service, and possibly to run code...
jackson-databind: information disclosure via Polymorphic Typing
An attacker can bypass access restrictions to data via Polymorphic Typing of jackson-databind, in order to obtain sensitive information...
FasterXML jackson-databind: code execution via SubTypeValidator
An attacker can use a vulnerability via SubTypeValidator of jackson-databind, in order to run code...
Ghostscript: code execution via Buildfont1 DSAFER Escape
An attacker can use a vulnerability via Buildfont1 DSAFER Escape of Ghostscript, in order to run code...
WordPress Give: SQL injection
An attacker can use a SQL injection of WordPress Give, in order to read or alter data...
Sonatype Nexus Repository Manager: code execution via OS Command Injection
An attacker can use a vulnerability via OS Command Injection of Sonatype Nexus Repository Manager, in order to run code...
Joomla Easy Discuss: SQL injection
An attacker can use a SQL injection of Joomla Easy Discuss, in order to read or alter data...
ImageMagick: denial of service via RemoveDuplicateLayers
An attacker can trigger a fatal error via RemoveDuplicateLayers() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via ComplexImages
An attacker can force a read at an invalid address via ComplexImages() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: seventeen vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: five vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: six vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 948 949 950 951 952 953 954 955 956 958 960 961 962 963 964 965 966 967 968 981 1001 1021 1022