The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ownCloud: vulnerability
A vulnerability of ownCloud was announced...
Dovecot: buffer overflow of pop3_deleted_flag
An attacker can generate a buffer overflow in pop3_deleted_flag of Dovecot, in order to trigger a denial of service, and possibly to run code...
Spring Social Core: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Spring Social Core, in order to force the victim to perform operations...
WordPress Easy Contact Form Solution: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easy Contact Form Solution, in order to run JavaScript code in the context of the web site...
WordPress Contact Form Integrated With Google Maps: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Contact Form Integrated With Google Maps, in order to run JavaScript code in the context of the web site...
SDDM: privilege escalation via KDE Crash Handler
An attacker can bypass restrictions in KDE Crash Handler of SDDM, in order to escalate his privileges...
python-cryptography: denial of service
An attacker can generate a fatal error of python-cryptography, in order to trigger a denial of service...
Cisco IOS: bypassing tunnel ACL
An attacker can bypass ACLs on tunnel interfaces of Cisco IOS when ACLs on physical interfaces are open, in order to access to network services which should be forbidden...
libpng: three vulnerabilities
An attacker can use several vulnerabilities of libpng...
WordPress BuddyPress: privilege escalation
An attacker can bypass restrictions of WordPress BuddyPress, in order to escalate his privileges...
WordPress Types: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Types, in order to run JavaScript code in the context of the web site...
Joomla Virtuemart: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Virtuemart, in order to run JavaScript code in the context of the web site...
WordPress WP Fastest Cache: SQL injection
An attacker can use a SQL injection of WordPress WP Fastest Cache, in order to read or alter data...
BlackBerry Enterprise Service: Cross Frame Scripting of Management Console
An attacker can trigger a Cross Frame Scripting in Management Console of BlackBerry Enterprise Service, in order to run JavaScript code in the context of the web site...
Google Chrome: information disclosure via PDF Viewer
An attacker can use a vulnerability in the PDF Viewer of Google Chrome, in order to obtain sensitive information...
Apache Commons Collections: code execution via InvokerTransformer
An attacker can send a malicious serialized Gadget Chain object to a Java application using Apache Commons Collections, in order to run shell code...
Drupal UC Profile: information disclosure
An attacker can use a vulnerability of Drupal UC Profile, in order to obtain sensitive information...
Drupal MAYO: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal MAYO, in order to run JavaScript code in the context of the web site...
wpasupplicant: denial of service via WPS P2P NFC NDEF
An attacker can send a malicious WPS P2P NFC NDEF packet to wpasupplicant, in order to trigger a denial of service...
wpasupplicant: five vulnerabilities
An attacker can use several vulnerabilities of wpasupplicant...
wpasupplicant: four vulnerabilities
An attacker can use several vulnerabilities of wpasupplicant...
Microsoft Lync, Skype for Business: information disclosure
An attacker can inject JavaScript code in Microsoft Lync or Skype for Business, in order read information of a web site...
Windows: decrypting BitLocker via Kerberos
An attacker can decrypt BitLocker data via Kerberos of Windows, in order to read sensitive information...
Windows: identity spoofing via Schannel
An attacker can use a Man-in-the-Middle on the TLS implementation of Schannel of Windows, in order to spoof the client identity...
Windows: denial of service via IPsec
An attacker can use IPsec of Windows, in order to trigger a denial of service...
Windows: privilege escalation via Winsock
A local attacker can corrupt the memory of Winsock of Windows, in order to escalate his privileges...
Microsoft .NET: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft .NET...
Windows: privilege escalation via NDIS
A local attacker can trigger an overflow in NDIS of Windows, in order to escalate his privileges...
Microsoft Office, Lync: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
Windows: multiple vulnerabilities of Kernel/Graphics
An attacker can use several vulnerabilities of Kernel/Graphics of Windows...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 557 558 559 560 561 562 563 564 565 567 569 570 571 572 573 574 575 576 577 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021