The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PHP: buffer overflow via msgfmt_parse_message
An attacker can generate a buffer overflow via msgfmt_parse_message() of PHP, in order to trigger a denial of service, and possibly to run code...
Linux kernel: buffer overflow via isdn_net.c
An attacker can generate a buffer overflow via isdn_net.c of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
libsoup: buffer overflow via HTTP Request
An attacker can generate a buffer overflow via HTTP Request of libsoup, in order to trigger a denial of service, and possibly to run code...
Sophos Anti-Virus: privilege escalation via Mac OS X
An attacker can bypass restrictions via Mac OS X of Sophos Anti-Virus, in order to escalate his privileges...
Synology Video Station: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology Video Station, in order to run JavaScript code in the context of the web site...
Synology Chat: information disclosure via SSRF
An attacker can bypass access restrictions to data via SSRF of Synology Chat, in order to obtain sensitive information...
PostgreSQL: three vulnerabilities
An attacker can use several vulnerabilities of PostgreSQL...
PSPP: two vulnerabilities
An attacker can use several vulnerabilities of PSPP...
Drupal Facebook Like Button: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Facebook Like Button, in order to run JavaScript code in the context of the web site...
Drupal Session Cache API: vulnerability
A vulnerability of Drupal Session Cache API was announced...
Drupal Better Field Descriptions: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Better Field Descriptions, in order to run JavaScript code in the context of the web site...
Drupal Relation: privilege escalation
An attacker can bypass restrictions of Drupal Relation, in order to escalate his privileges...
Node.js Modules: information disclosure
An attacker can invite the victim to install malicious Node.js modules, in order to obtain sensitive information...
Nessus: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Nessus, in order to read or write data in the session...
tcmu-runner: multiple vulnerabilities
An attacker can use several vulnerabilities of tcmu-runner...
Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox and Thunderbird...
FortiOS: information disclosure via IKE Vendor ID
An attacker can bypass access restrictions to data via IKE Vendor ID of FortiOS, in order to obtain sensitive information...
FortiOS: security improvement via SMBv1 Support Disabled
The security of FortiOS was improved via SMBv1 Support Disabled...
curl: three vulnerabilities
An attacker can use several vulnerabilities of curl...
Windows: vulnerabilities of August 2017
An attacker can use several vulnerabilities of Microsoft products...
Microsoft SharePoint Server 2010: information disclosure via Spoofing
An attacker can bypass access restrictions to data of Microsoft SharePoint Server 2010, in order to obtain sensitive information...
Microsoft SQL Server: information disclosure
An attacker can bypass access restrictions to data of Microsoft SQL Server, in order to obtain sensitive information...
Microsoft Office/Outlook: vulnerabilities of August 2017
An attacker can use several vulnerabilities of Microsoft products...
Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
Adobe Flash Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Internet Explorer: vulnerabilities of August 2017
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Edge: vulnerabilities of August 2017
An attacker can use several vulnerabilities of Microsoft products...
Jenkins SAML: information disclosure
An attacker can bypass access restrictions to data of Jenkins SAML, in order to obtain sensitive information...
WordPress PressForward: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress PressForward, in order to run JavaScript code in the context of the web site...
SAP: multiples vulnerabilities of August 2017
An attacker can use several vulnerabilities of SAP products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 730 731 732 733 734 735 736 737 738 740 742 743 744 745 746 747 748 749 750 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1058