The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
S3QL: code execution via pickle
An attacker can use a vulnerability in pickle of S3QL, in order to run code...
Apache httpd: three vulnerabilities
An attacker can use several vulnerabilities of Apache httpd...
WordPress CP Contact Form with Paypal: three vulnerabilities
An attacker can use several vulnerabilities of WordPress CP Contact Form with Paypal...
Oracle Berkeley DB: several vulnerabilities of July 2015
Several vulnerabilities of Oracle Berkeley DB were announced in July 2015...
Oracle MySQL: several vulnerabilities of July 2015
Several vulnerabilities of Oracle MySQL were announced in July 2015...
Oracle Solaris: several vulnerabilities of July 2015
Several vulnerabilities of Oracle Solaris were announced in July 2015...
Oracle Fusion: several vulnerabilities of July 2015
Several vulnerabilities of Oracle Fusion were announced in July 2015...
Oracle Database: several vulnerabilities of July 2015
Several vulnerabilities of Oracle Database were announced in July 2015...
Oracle Java: several vulnerabilities of July 2015
Several vulnerabilities of Oracle Java were announced in July 2015...
Adobe Flash Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Adobe Shockwave Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Shockwave Player...
Windows: memory corruption via ATM Font Driver
A local attacker can generate a memory corruption in ATMFD.DLL of Windows, in order to trigger a denial of service, and possibly to run code...
Windows: privilege escalation via RPC
A local attacker can bypass the authentication via RPC of Windows, in order to escalate his privileges...
Windows: two vulnerabilities of OLE
An attacker can use several vulnerabilities of OLE of Windows...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Windows: privilege escalation via MSI
A local attacker can create a Trojan Horse for the Windows Installer, in order to escalate his privileges...
Windows: six vulnerabilities of Win32k
An attacker can use several vulnerabilities of Win32k of Windows...
Windows: privilege escalation via Bitmap
A local attacker can request the conversion of a Bitmap image on Windows, in order to escalate his privileges...
Windows: privilege escalation via Netlogon
An attacker can use the Netlogon service of Windows, in order to escalate his privileges...
Microsoft Office: eight vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
Windows: code execution via DLL
An attacker can invite the victim to open an application from a directory containing a malicious DLL, in order to run code...
Windows: two vulnerabilities of Hyper-V
An attacker can use several vulnerabilities of Hyper-V of Windows...
Windows: code execution via RDP
An attacker can send several malicious packets to the RDP service of Windows, in order to run code...
Microsoft VBScript: memory corruption
An attacker can generate a memory corruption of Microsoft VBScript, in order to trigger a denial of service, and possibly to run code...
Microsoft SQL Server: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft SQL Server...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Android: file creation via ADB
An attacker can bypass access restrictions of ADB of Android, in order for example to create a Trojan horse...
WordPress GD bbPress Attachments: two vulnerabilities
An attacker can use several vulnerabilities of WordPress GD bbPress Attachments...
WordPress InfiniteWP Client: vulnerability
A vulnerability of WordPress InfiniteWP Client was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 526 527 528 529 530 531 532 533 534 536 538 539 540 541 542 543 544 545 546 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1036