The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
jython: code execution via object deserialization
An attacker can use a vulnerability of jython, in order to run code...
expat: infinite loop
An attacker can generate an infinite loop of expat, in order to trigger a denial of service...
Joomla JoomRecipe: SQL injection
An attacker can use a SQL injection of Joomla JoomRecipe, in order to read or alter data...
tor: assertion error
An attacker can force an assertion failure of tor, in order to trigger a denial of service...
request-tracker: four vulnerabilities
An attacker can use several vulnerabilities of request-tracker...
Fortinet FortiOS: Cross Site Scripting via comments
An attacker can trigger a Cross Site Scripting via comments in Fortinet FortiOS, in order to run JavaScript code in the context of the web site...
Microsoft Windows XP, 2003: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Windows XP, 2003...
Wireshark: two vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
HPE SiteScope: four vulnerabilities
An attacker can use several vulnerabilities of HPE SiteScope...
ISC BIND: two vulnerabilities
An attacker can use several vulnerabilities of ISC BIND...
YARA: use after free via sized_string_cmp
An attacker can force the usage of a freed memory area via sized_string_cmp() of YARA, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via drm/vmwgfx
A local attacker can read 4 bytes of the Linux kernel memory via the drm/vmwgfx driver, in order to get sensitive information...
curl on MS-Windows: buffer overflow via an URL of scheme file
An attacker can generate a buffer overflow via an URL of scheme file in curl, in order to trigger a denial of service, and possibly to run code...
RabbitMQ: two vulnerabilities
An attacker can use several vulnerabilities of RabbitMQ...
Cisco IOS XR: denial of service via Traffic Engineering
An authenticated local attacker can stop the tunnel of type Traffic Engineering of Cisco IOS XR, in order to trigger a denial of service...
WordPress Event List: SQL injection
An attacker can use a SQL injection of WordPress Event List, in order to read or alter data...
WordPress WP Jobs: SQL injection via the parameter jobid
An attacker can use a SQL injection via the request parameter jobid of WordPress WP Jobs, in order to read or alter data...
Berkeley DB: privilege escalation via a DB_CONFIG file
An attacker can bypass restrictions via DB_CONFIG of Berkeley DB, in order to escalate his privileges...
GnuTLS: denial of service via an OpenPGP certificate
An attacker can send malicious OpenPGP certificates to GnuTLS, in order to trigger a denial of service...
Mercurial: code execution
An attacker can use a vulnerability of Mercurial, in order to run code...
Mozilla Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox and Thunderbird...
Microsoft Skype for Business: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Skype for Business...
Microsoft Silverlight: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Silverlight...
Microsoft Lync: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Lync...
Microsoft Office: vulnerabilities of June 2017
An attacker can use several vulnerabilities of Microsoft Office...
Microsoft Edge: vulnerabilities of June 2017
An attacker can use several vulnerabilities of Edge...
Microsoft Internet Explorer: vulnerabilities of June 2017
An attacker can use several vulnerabilities of Internet Explorer...
Microsoft Windows: vulnerabilities of June 2017
An attacker can use several vulnerabilities of Microsoft Windows...
Adobe Shockwave Player: memory corruption
An attacker can generate a memory corruption of Adobe Shockwave Player, in order to trigger a denial of service, and possibly to run code...
Adobe Flash Player: nine vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 713 714 715 716 717 718 719 720 721 723 725 726 727 728 729 730 731 732 733 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021