The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mozilla Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox...
Windows: memory corruption via Uniscribe
An attacker can generate a memory corruption via Uniscribe of Windows, in order to trigger a denial of service, and possibly to run code...
Windows: three vulnerabilities via Graphics Component
An attacker can use several vulnerabilities via Graphics Component of Windows...
Microsoft Edge: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Edge...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
UnZip: buffer overflow
An attacker can generate a buffer overflow of UnZip, in order to trigger a denial of service, and possibly to run code...
WordPress MailChimp: multiple Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress MailChimp, in order to run JavaScript code in the context of the web site...
SAP: multiples vulnerabilities of December 2016
An attacker can use several vulnerabilities of SAP products...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
SimpleSAMLphp: incorrect signature validation
An attacker can bypass the signature validation of SimpleSAMLphp, in order to alter data...
Go Language: memory leak via Request.ParseMultipartForm
An attacker can create a descriptor leak via Request.ParseMultipartForm of Go Language, in order to trigger a denial of service...
McAfee VirusScan Enterprise: multiple vulnerabilities
An attacker can use several vulnerabilities of McAfee VirusScan Enterprise...
WordPress Delete-All-Comments: file upload via delete-all-comments.php
An attacker can upload a malicious file via delete-all-comments.php on WordPress Delete-All-Comments, in order for example to upload a Trojan...
WordPress BP Profile Search: code execution via PHP object injection
An attacker can inject a PHP object into WordPress BP Profile Search, in order to run code...
Apache Tomcat: information disclosure via sendfile
An attacker can use a vulnerability via sendfile() of Apache Tomcat, in order to obtain sensitive information or to hijack a session...
Linux kernel: out-of-bounds memory reading via ICMP Header
An attacker can force a read at an invalid address via ICMP Header on the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
GStreamer Plugin: vulnerability
A vulnerability of GStreamer Plugin was announced...
GStreamer Plugin: vulnerability
A vulnerability of GStreamer Plugin was announced...
OpenJPEG: two vulnerabilities
An attacker can use several vulnerabilities of OpenJPEG...
libgsf: NULL pointer dereference via tar_directory_for_file
An attacker can force a NULL pointer to be dereferenced via tar_directory_for_file() of libgsf, in order to trigger a denial of service...
JasPer: buffer overflow via jpc_tsfb_getbands2
An attacker can generate a buffer overflow via jpc_tsfb_getbands2() of JasPer, in order to trigger a denial of service, and possibly to run code...
JasPer: buffer overflow via QMFB
An attacker can generate a buffer overflow via QMFB of JasPer, in order to trigger a denial of service, and possibly to run code...
WordPress Google Analytics Counter Tracker: code execution via unserialize
An attacker can use a vulnerability via unserialize() of WordPress Google Analytics Counter Tracker, in order to run code...
SIMATIC WinCC, PCS 7: out-of-bounds memory reading via ActiveX
An attacker can force a read at an invalid address via ActiveX of SIMATIC WinCC, in order to trigger a denial of service, or to obtain sensitive information...
SIMATIC S7: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC S7...
ImageMagick: buffer overflow via convert
An attacker can generate a buffer overflow via convert of ImageMagick, in order to trigger a denial of service, and possibly to run code...
WordPress Social Share Buttons Social Pug: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Social Share Buttons Social Pug, in order to run JavaScript code in the context of the web site...
WordPress Multisite Post Duplicator: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Multisite Post Duplicator, in order to force the victim to perform operations...
Asterisk: privilege escalation via SIP Proxy
An attacker can bypass restrictions via SIP Proxy of Asterisk, in order to escalate his privileges...
Asterisk: denial of service via SDP Opus Format Space
An attacker can generate a fatal error via SDP Opus Format Space of Asterisk, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 659 660 661 662 663 664 665 666 667 669 671 672 673 674 675 676 677 678 679 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020