The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Windows, .NET, Office, Skype, Lync, Silverlight: seven vulnerabilities via Graphics Component
Several vulnerabilities were announced in Windows, .NET, Office, Skype, Lync and Silverlight...
Microsoft Edge: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Edge...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Joomla Virtuemart: file upload
An attacker can upload a malicious file on Joomla Virtuemart, in order for example to upload a Trojan...
SAP: multiples vulnerabilities of October 2016
An attacker can use several vulnerabilities of SAP products...
WordPress WP Editor: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Editor, in order to run JavaScript code in the context of the web site...
WordPress Portfolio: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Portfolio, in order to run JavaScript code in the context of the web site...
WordPress Calendar: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Calendar, in order to run JavaScript code in the context of the web site...
OpenSSH: denial of service via kex_input_kexinit
An unauthenticated attacker can send some SSH messages to OpenSSH, in order to trigger a denial of service...
GraphicsMagick: integer overflow via 8BIM
An attacker can generate an integer overflow via 8BIM of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: four vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
MuJS: two vulnerabilities
Several vulnerabilities were announced in MuJS...
irssi: information disclosure via buf.pl
An attacker can bypass access restrictions to data via buf.pl of irssi, in order to obtain sensitive information...
RHEL, Fedora: privilege escalation via /etc/sysconfig/tomcat
An attacker can alter a file of /etc/sysconfig/tomcat on RHEL, in order to escalate his privileges...
Linux kernel: denial of service via GRO
An attacker can send malicious GRO packets to the Linux kernel, in order to trigger a denial of service...
portsnap: code execution
An attacker can use a vulnerability of portsnap, in order to run code...
QEMU: NULL pointer dereference via virtio-9p
An attacker, inside a guest system, can force a NULL pointer to be dereferenced via virtio-9p of QEMU, in order to trigger a denial of service on the host system...
QEMU: memory leak via v9fs_read
An attacker, inside a guest system, can create a memory leak via v9fs_read of QEMU, in order to trigger a denial of service on the host system...
QEMU: infinite loop via xhci_ring_fetch
An attacker, inside a guest system, can generate an infinite loop via xhci_ring_fetch of QEMU, in order to trigger a denial of service on the host system...
RHEL, Fedora: privilege escalation via Tomcat
An attacker can bypass restrictions via Tomcat of Red Hat, in order to escalate his privileges...
libdwarf: buffer overflow via _dwarf_read_loc_section
An attacker can generate a buffer overflow via _dwarf_read_loc_section of libdwarf, in order to trigger a denial of service, and possibly to run code...
Python Pillow: integer overflow
An attacker can generate an integer overflow of Python Pillow, in order to trigger a denial of service, and possibly to run code...
mat: information disclosure via PDF
An attacker can bypass access restrictions to data via PDF of mat, in order to obtain sensitive information...
QEMU: memory leak via ehci_process_itd
An attacker, inside a guest system, can create a memory leak via ehci_process_itd() of QEMU, in order to trigger a denial of service on the host system...
QEMU: memory leak via virtio_gpu_resource_create_2d
An attacker, inside a guest system, can create a memory leak via virtio_gpu_resource_create_2d() of QEMU, in order to trigger a denial of service on the host system...
Usermin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Usermin, in order to run JavaScript code in the context of the web site...
Trend Micro Internet Security: NULL pointer dereference via tmnciesc
An attacker can force a NULL pointer to be dereferenced via tmnciesc of Trend Micro Internet Security, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 642 643 644 645 646 647 648 649 651 653 654 655 656 657 658 659 660 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102