The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Edge: multiple vulnerabilities
An attacker can use several vulnerabilities of Edge...
Adobe Flash Player: nine vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
SAP: multiples vulnerabilities of November 2016
An attacker can use several vulnerabilities of SAP products...
Android OS: multiple vulnerabilities of 2016-11-05
An attacker can use several vulnerabilities of Android OS...
Android OS: multiple vulnerabilities of 2016-11-01
An attacker can use several vulnerabilities of Android OS...
Linux kernel: memory corruption via tipc_msg_build
An attacker can generate a memory corruption via tipc_msg_build() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
WordPress Caldera Forms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Caldera Forms, in order to run JavaScript code in the context of the web site...
WordPress WassUp Real Time Analytics: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WassUp Real Time Analytics, in order to run JavaScript code in the context of the web site...
WordPress YITH WooCommerce Compare: code execution
An attacker can use a vulnerability of WordPress YITH WooCommerce Compare, in order to run code...
Siemens SIMATIC: privilege escalation via Windows
An attacker can bypass restrictions via Windows of Siemens SIMATIC, in order to escalate his privileges...
MAT: information disclosure via PDF
An attacker can bypass access restrictions to data via PDF of MAT, in order to obtain sensitive information...
Python Imaging: two vulnerabilities
An attacker can use several vulnerabilities of Python Imaging...
HPE Network Node Manager i: two vulnerabilities
An attacker can use several vulnerabilities of HPE Network Node Manager i...
HPE Network Node Manager i: code execution
An attacker can use a vulnerability of HPE Network Node Manager i, in order to run code...
libxslt: out-of-bounds memory reading
An attacker can force a read at an invalid address of libxslt, in order to trigger a denial of service, or to obtain sensitive information...
libxml2: NULL pointer dereference via Recover Mode
An attacker can force a NULL pointer to be dereferenced via Recover Mode of libxml2, in order to trigger a denial of service...
Linux kernel: denial of service via unregister_sysctl_table
An attacker can generate a locking via unregister_sysctl_table() on the Linux kernel, in order to trigger a denial of service...
Linux kernel: buffer overflow via Firewire IP-over-1394
An attacker can generate a buffer overflow via Firewire IP-over-1394 on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
JasPer: eight vulnerabilities
An attacker can use several vulnerabilities of JasPer...
JasPer: four vulnerabilities
An attacker can use several vulnerabilities of JasPer...
F5 BIG-IP: Cross Site Request Forgery via TMUI
An attacker can trigger a Cross Site Request Forgery via TMUI of F5 BIG-IP, in order to force the victim to perform operations...
libwebp: integer overflow
An attacker can generate an integer overflow of libwebp, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via lrw_crypt
An attacker can force a NULL pointer to be dereferenced via lrw_crypt() on the Linux kernel, in order to trigger a denial of service...
Pacemaker: privilege escalation via libqb-facilitated IPC
An attacker can bypass restrictions via libqb-facilitated IPC of Pacemaker, in order to escalate his privileges...
openslp: memory corruption
An attacker can generate a memory corruption of openslp, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 649 650 651 652 653 654 655 656 657 659 661 662 663 664 665 666 667 668 669 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020