The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
VLC: vulnerability of Third Party Libraries
A vulnerability in Third Party Libraries of VLC was announced...
WordPress Advanced Custom Fields: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Advanced Custom Fields, in order to run JavaScript code in the context of the web site...
WordPress Ghost: file reading
An attacker can read a file of WordPress Ghost, in order to obtain sensitive information...
Juniper EX: incorrect filtering of OSPF
An attacker can send OSPF packets to Juniper EX, which are not blocked...
Google Android OS: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Android OS...
Mercurial: code execution via Git
An attacker can use a vulnerability in Git of Mercurial, in order to run code...
Botan: vulnerability of ECDSA Side Channel Attack
A vulnerability in ECDSA Side Channel Attack of Botan was announced...
Botan: vulnerability of RSA Decryption Side Channel Attack
A vulnerability in RSA Decryption Side Channel Attack of Botan was announced...
Botan: two vulnerabilities
An attacker can use several vulnerabilities of Botan...
Ubuntu 16.04: privilege escalation via ubuntu-core-launcher
An attacker can bypass restrictions in ubuntu-core-launcher of Ubuntu 16.04, in order to escalate his privileges...
IBM JDK: code execution via CORBA Deserialization
An attacker can use a vulnerability in CORBA Deserialization of IBM JDK, in order to run code...
IBM JDK: code execution via CORBA Invoke
An attacker can use a vulnerability in CORBA Invoke of IBM JDK, in order to run code...
IBM JDK: buffer overflow of JVM
An attacker can generate a buffer overflow in JVM of IBM JDK, in order to trigger a denial of service, and possibly to run code...
Linux kernel: root file creation via coredump
An attacker can trigger a coredump with a special configuration of the Linux kernel, in order to create a file with root privileges...
OpenVAS: Cross Site Scripting of get_aggregate
An attacker can trigger a Cross Site Scripting in get_aggregate of OpenVAS, in order to run JavaScript code in the context of the web site...
RoundCube Webmail: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of RoundCube Webmail, in order to force the victim to perform operations...
RoundCube Webmail: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of RoundCube Webmail, in order to run JavaScript code in the context of the web site...
RoundCube Webmail: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of RoundCube Webmail, in order to run JavaScript code in the context of the web site...
tardiff: two vulnerabilities
An attacker can use several vulnerabilities of tardiff...
WordPress Google Authenticator: privilege escalation
An attacker can bypass restrictions of WordPress Google Authenticator, in order to escalate his privileges...
WordPress Simple Photo Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Simple Photo Gallery, in order to run JavaScript code in the context of the web site...
WordPress Truemag: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Truemag, in order to run JavaScript code in the context of the web site...
WordPress Core: three vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Joomla Komento: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Komento, in order to run JavaScript code in the context of the web site...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
IBM DB2: denial of service via DRDA
An attacker can send a malicious DRDA packet to IBM DB2, in order to trigger a denial of service...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
i7z: denial of service via Print_Information_Processor
An attacker can generate a fatal error in Print_Information_Processor of i7z, in order to trigger a denial of service...
WordPress Jetpack: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Jetpack, in order to run JavaScript code in the context of the web site...
Apache Subversion: two vulnerabilities
An attacker can use several vulnerabilities of Apache Subversion...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 597 598 599 600 601 602 603 604 605 607 609 610 611 612 613 614 615 616 617 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103