The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle Berkeley DB: five vulnerabilities of April 2016
An attacker can use several vulnerabilities of Oracle Berkeley DB...
Oracle VM VirtualBox: three vulnerabilities of April 2016
An attacker can use several vulnerabilities of Oracle VM VirtualBox...
Oracle Solaris: multiple vulnerabilities of April 2016
An attacker can use several vulnerabilities of Oracle Solaris...
Oracle Java: multiple vulnerabilities of April 2016
An attacker can use several vulnerabilities of Oracle Java...
Oracle Fusion Middleware: multiple vulnerabilities of April 2016
An attacker can use several vulnerabilities of Oracle Fusion Middleware...
Oracle Database: five vulnerabilities of April 2016
An attacker can use several vulnerabilities of Oracle Database...
Linux kernel: file corruption via ext4 Punch Hole
A local attacker can manipulate data on ext4 on the Linux kernel, in order to alter a file...
Cisco IOS, IOS XE: changing time via NTP
An attacker can send malicious NTP packets to Cisco IOS or IOS XE, in order to change the system date...
PAN-OS: bypassing url filtering
An attacker can add an HTTP header for PAN-OS, in order to bypass the url filtering...
Node.js marked: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js marked, in order to run JavaScript code in the context of the web site...
Node.js npm: information disclosure via Token Leak
An attacker can bypass access restrictions to tokens of Node.js npm, in order to obtain sensitive information...
Node.js console-io: privilege escalation
An attacker can bypass restrictions of Node.js console-io, in order to escalate his privileges...
systemd: file reading Journal Files
A local attacker can read Journal Files of systemd, in order to obtain sensitive information...
systemd: file reading Journal Files
A local attacker can read Journal Files of systemd, in order to obtain sensitive information...
WordPress JQuery Html5 File Upload: file upload
An attacker can upload a malicious file on WordPress JQuery Html5 File Upload, in order for example to upload a Trojan...
Linux kernel: buffer overflow of usbip_recv_xbuff
An attacker can generate a buffer overflow in usbip_recv_xbuff() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
HP Data Protector: five vulnerabilities
An attacker can use several vulnerabilities of HP Data Protector...
GnuPG: code execution during installation
An attacker can invite the victim to download malicious libraries on Windows, in order to run code during the installation of GnuPG...
Xen: NULL pointer dereference via Shadow Pagetables
An attacker can force a NULL pointer to be dereferenced in Shadow Pagetables of Xen, in order to trigger a denial of service...
OptiPNG: two vulnerabilities
An attacker can use several vulnerabilities of OptiPNG...
QEMU: infinite loop of ehci_advance_state
An attacker in a guest system can generate an infinite loop in the ehci_advance_state() function of QEMU, in order to trigger a denial of service on the host system...
WordPress FAQ WD: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress FAQ WD, in order to run JavaScript code in the context of the web site...
WordPress Custom-metas: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Custom-metas, in order to run JavaScript code in the context of the web site...
WordPress leenk.me: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress leenk.me, in order to run JavaScript code in the context of the web site...
WordPress Kento Post View Counter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Kento Post View Counter, in order to run JavaScript code in the context of the web site...
OptiPNG: two vulnerabilities
An attacker can use several vulnerabilities of OptiPNG...
NetBSD: privilege escalation via calendar
A local attacker can manipulate the calendar tool of NetBSD, in order to escalate his privileges or to read files...
fuseiso: two vulnerabilities
An attacker can use several vulnerabilities of fuseiso...
OpenSSH: privilege escalation via UseLogin
A local attacker can use UseLogin of OpenSSH, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 594 595 596 597 598 599 600 601 602 604 606 607 608 609 610 611 612 613 614 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1035