The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
qpid-cpp: denial of service via AMQP
An attacker can force an assertion error in AMQP of qpid-cpp, in order to trigger a denial of service...
libmodbus: buffer overflow
An attacker can generate a buffer overflow of libmodbus, in order to trigger a denial of service, and possibly to run code...
Drupal Scald File: file upload
An attacker can upload a malicious file on Drupal Scald File, in order for example to upload a Trojan...
Rails: two vulnerabilities of Action Pack
An attacker can use several vulnerabilities of Action Pack of Rails...
libotr: integer overflow
An attacker can generate an integer overflow of libotr, in order to trigger a denial of service, and possibly to run code...
ISC BIND: three vulnerabilities
An attacker can use several vulnerabilities of ISC BIND...
Cisco ASA 5500: memory leak via CSC-SSM
An attacker can create a memory leak in CSC-SSM of Cisco ASA 5500, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via digi_acceleport
An attacker can force a NULL pointer to be dereferenced in the digi_acceleport() function of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via wacom
An attacker can force a NULL pointer to be dereferenced in the wacom driver of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via mct_u232
An attacker can force a NULL pointer to be dereferenced in the mct_u232() function of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via cypress_m8
An attacker can force a NULL pointer to be dereferenced in the cypress_m8() function of the Linux kernel, in order to trigger a denial of service...
Linux kernel: NULL pointer dereference via cdc_acm
An attacker can force a NULL pointer to be dereferenced in the cdc_acm() function of the Linux kernel, in order to trigger a denial of service...
Google Chrome: three vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
WordPress SiteMile Project Theme: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress SiteMile Project Theme, in order to run JavaScript code in the context of the web site...
Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
Mozilla NSS: two vulnerabilities
An attacker can use several vulnerabilities of Mozilla NSS...
Microsoft .NET: bypassing XML signature
An attacker can alter an XML document, which is not detected as modified by Microsoft .NET...
Windows: four vulnerabilities of Win32k
An attacker can use several vulnerabilities of Win32k of Windows...
Windows: privilege escalation via USB Mass Storage
A local attacker can plug a USB key on Windows, in order to escalate his privileges...
Windows: privilege escalation via Secondary Logon Service
A local attacker can use Secondary Logon Service of Windows, in order to escalate his privileges...
Windows: privilege escalation
A local attacker can manipulate Windows memory, in order to escalate his privileges...
Windows: two vulnerabilities of OLE
An attacker can use several vulnerabilities of OLE of Windows...
Microsoft Office: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
Windows: two vulnerabilities of PDF
An attacker can use several vulnerabilities of PDF of Windows...
Windows: two vulnerabilities of Media
An attacker can use several vulnerabilities of Media of Windows...
Windows: two vulnerabilities of OpenType
An attacker can use several vulnerabilities of OpenType of Windows...
Windows: privilege escalation via DLL Loading
An attacker can invite the victim to open an Office document from a directory containing a malicious wab32res.dll library, in order to execute code with victim's privileges...
Microsoft Edge: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Edge...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Adobe Reader/Acrobat: three vulnerabilities
An attacker can use several vulnerabilities of Adobe Reader/Acrobat...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 585 586 587 588 589 590 591 592 593 595 597 598 599 600 601 602 603 604 605 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013