The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Site Analytics: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Site Analytics, in order to force the victim to perform operations...
PAN-OS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site...
PAN-OS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of PAN-OS, in order to run JavaScript code in the context of the web site...
libgd: buffer overflow via dynamicGetbuf
An attacker can generate a buffer overflow via dynamicGetbuf of libgd, in order to trigger a denial of service, and possibly to run code...
libgd: out-of-bounds memory reading via gdImageCreateFromTiffPtr
An attacker can force a read at an invalid address via gdImageCreateFromTiffPtr of libgd, in order to trigger a denial of service, or to obtain sensitive information...
Tor: denial of service
An attacker can generate a fatal error of Tor, in order to trigger a denial of service...
WebKitGTK+: vulnerability
A vulnerability of WebKitGTK+ was announced...
libgit2: two vulnerabilities
An attacker can use several vulnerabilities of libgit2...
GUILE: two vulnerabilities
An attacker can use several vulnerabilities of GUILE...
Oracle Outside In Technology: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle Outside In Technology...
Oracle Fusion Middleware: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle Fusion Middleware...
Oracle Database: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle Database...
Oracle Java: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle Java...
Oracle Solaris: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle Solaris...
Oracle VM VirtualBox: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle VM VirtualBox...
ffmpeg: denial of service via strh
An attacker can generate a fatal error via strh of ffmpeg, in order to trigger a denial of service...
ffmpeg: memory leak via strh
An attacker can create a memory leak via strh of ffmpeg, in order to trigger a denial of service...
ffmpeg: NULL pointer dereference via gab2
An attacker can force a NULL pointer to be dereferenced via gab2 of ffmpeg, in order to trigger a denial of service...
ffmpeg: buffer overflow via Block Values
An attacker can generate a buffer overflow via Block Values of ffmpeg, in order to trigger a denial of service, and possibly to run code...
ffmpeg: buffer overflow via avi
An attacker can generate a buffer overflow via avi of ffmpeg, in order to trigger a denial of service, and possibly to run code...
Node.js reduce-css-calc: code execution
An attacker can use a vulnerability of Node.js reduce-css-calc, in order to run code...
Node.js nunjucks: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js nunjucks, in order to run JavaScript code in the context of the web site...
Node.js pouchdb: code execution
An attacker can use a vulnerability of Node.js pouchdb, in order to run code...
Node.js plotly.js: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js plotly.js, in order to run JavaScript code in the context of the web site...
Node.js uws: denial of service
An attacker can generate a fatal error of Node.js uws, in order to trigger a denial of service...
Quagga: buffer overflow via zebra IPv6 RA
An attacker can generate a buffer overflow via zebra IPv6 RA of Quagga, in order to trigger a denial of service, and possibly to run code...
Apache Commons FileUpload: read-write access
An attacker can bypass access restrictions of Apache Commons FileUpload, in order to read or alter files...
Oracle MySQL: vulnerabilities of October 2016
An attacker can use several vulnerabilities of Oracle MySQL...
AIX: privilege escalation via lsmcode
A local attacker can use lsmcode of AIX, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 644 645 646 647 648 649 650 651 652 654 656 657 658 659 660 661 662 663 664 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022