The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of ASE

jQuery Core: Cross Site Scripting via HtmlPrefilter Regex
An attacker can trigger a Cross Site Scripting via HtmlPrefilter Regex of jQuery Core, in order to run JavaScript code in the context of the web site...
20200601, 20200602, 20200603, 20200604, 20200605, 6217392, 6253319, 6344075, CERTFR-2020-AVI-310, CERTFR-2020-AVI-335, cpujul2020, CVE-2020-11022, CVE-2020-11023, DRUPAL-SA-CORE-2020-002, DRUPAL-SA-CORE-2020-003, DSA-4693-1, FEDORA-2020-0b32a59b54, FEDORA-2020-11be4b36d4, FEDORA-2020-7dddce530c, FEDORA-2020-8a15713da2, FEDORA-2020-fbb94073a1, K02453220, K66544153, NPM-1518, openSUSE-SU-2020:1060-1, openSUSE-SU-2020:1106-1, OSA-2020-14, RHSA-2020:3936-01, VIGILANCE-VUL-32007
SAP: multiple vulnerabilities of December 2019
An attacker can use several vulnerabilities of SAP products...
CVE-2019-0325, CVE-2019-0395, CVE-2019-0398, CVE-2019-0399, CVE-2019-0402, CVE-2019-0403, CVE-2019-0404, CVE-2019-0405, VIGILANCE-VUL-31109
jQuery Core: privilege escalation via Object.prototype Pollution
An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges...
bulletinoct2019, cpuapr2020, cpujan2020, cpujul2019, cpujul2020, cpuoct2019, CST-7312, CVE-2019-11358, DLA-1797-1, DLA-2118-1, DRUPAL-SA-CORE-2019-005, DRUPAL-SA-CORE-2019-006, DSA-4460-1, EZSA-2019-005, FEDORA-2019-2a0ce0c58c, FEDORA-2019-a06dffab1c, FEDORA-2019-f563e66380, NTAP-20190919-0001, openSUSE-SU-2019:1839-1, openSUSE-SU-2019:1872-1, RHSA-2019:1456-01, RHSA-2020:3936-01, Synology-SA-19:19, VIGILANCE-VUL-29030
SAP: multiples vulnerabilities of December 2018
An attacker can use several vulnerabilities of SAP products...
CVE-2018-2486, CVE-2018-2492, CVE-2018-2494, CVE-2018-2497, CVE-2018-2500, CVE-2018-2502, CVE-2018-2503, CVE-2018-2504, CVE-2018-2505, VIGILANCE-VUL-28002
SAP: multiples vulnerabilities of November 2018
An attacker can use several vulnerabilities of SAP products...
CVE-2018-2473, CVE-2018-2476, CVE-2018-2477, CVE-2018-2478, CVE-2018-2479, CVE-2018-2481, CVE-2018-2482, CVE-2018-2483, CVE-2018-2485, CVE-2018-2487, CVE-2018-2488, CVE-2018-2489, CVE-2018-2490, CVE-2018-2491, VIGILANCE-VUL-27765
SAP: multiples vulnerabilities of October 2018
An attacker can use several vulnerabilities of SAP products...
CVE-2018-2466, CVE-2018-2467, CVE-2018-2468, CVE-2018-2469, CVE-2018-2470, CVE-2018-2471, CVE-2018-2472, CVE-2018-2474, VIGILANCE-VUL-27445
SAP: multiples vulnerabilities of September 2018
An attacker can use several vulnerabilities of SAP products...
CVE-2018-16832, CVE-2018-2452, CVE-2018-2454, CVE-2018-2455, CVE-2018-2457, CVE-2018-2458, CVE-2018-2459, CVE-2018-2460, CVE-2018-2461, CVE-2018-2462, CVE-2018-2463, CVE-2018-2464, CVE-2018-2465, VIGILANCE-VUL-27204
SAP: multiples vulnerabilities of August 2018
An attacker can use several vulnerabilities of SAP products...
CVE-2018-2441, CVE-2018-2442, CVE-2018-2444, CVE-2018-2445, CVE-2018-2446, CVE-2018-2447, CVE-2018-2448, CVE-2018-2449, CVE-2018-2450, CVE-2018-2451, VIGILANCE-VUL-26981
SAP: multiples vulnerabilities of July 2018
An attacker can use several vulnerabilities of SAP products...
CVE-2018-2427, CVE-2018-2431, CVE-2018-2432, CVE-2018-2433, CVE-2018-2434, CVE-2018-2435, CVE-2018-2436, CVE-2018-2437, CVE-2018-2438, CVE-2018-2439, CVE-2018-2440, VIGILANCE-VUL-26673
SAP: multiples vulnerabilities of June 2018
An attacker can use several vulnerabilities of SAP products...
CERTFR-2018-AVI-291, CVE-2018-2424, CVE-2018-2425, CVE-2018-2428, VIGILANCE-VUL-26393
Our database contains other pages. You can request a free trial to read them.

Display information about ASE: