The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress WP Image Zoom: denial of service
An attacker can generate a fatal error of WordPress WP Image Zoom, in order to trigger a denial of service...
WordPress Rating-Widget: information disclosure
An attacker can bypass access restrictions to data of WordPress Rating-Widget, in order to obtain sensitive information...
WordPress Like Button Rating: privilege escalation
An attacker can bypass restrictions of WordPress Like Button Rating, in order to escalate his privileges...
WordPress Relevanssi: SQL injection
An attacker can use a SQL injection of WordPress Relevanssi, in order to read or alter data...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Microsoft Visual Studio: information disclosure
An attacker can bypass access restrictions to data of Microsoft Visual Studio, in order to obtain sensitive information...
Office: vulnerabilities of April 2018
An attacker can use several vulnerabilities of Microsoft products...
Windows: vulnerabilities of April 2018
An attacker can use several vulnerabilities of Microsoft products...
Edge, IE: vulnerabilities of April 2018
An attacker can use several vulnerabilities of Microsoft products...
SAP: multiples vulnerabilities of April 2018
An attacker can use several vulnerabilities of SAP products...
Spring Framework: information disclosure via Multipart Content
An attacker can bypass access restrictions to data via Multipart Content of Spring Framework, in order to obtain sensitive information...
Joomla jDownloads: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla jDownloads, in order to run JavaScript code in the context of the web site...
Joomla com_gridbox: multiple vulnerabilities
An attacker can use several vulnerabilities of Joomla com_gridbox...
WordPress WP Live Chat Support: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Live Chat Support, in order to run JavaScript code in the context of the web site...
Zabbix: information disclosure via Config Proxy Request
An attacker can bypass access restrictions to data via Config Proxy Request of Zabbix, in order to obtain sensitive information...
Ruby Rack Protection: vulnerability via authenticity_token.rb
A vulnerability via authenticity_token.rb of Ruby Rack Protection was announced...
pcs: information disclosure via Debug Parameter
An attacker can bypass access restrictions to data via Debug Parameter of pcs, in order to obtain sensitive information...
pcs: privilege escalation via REST Call
An attacker can bypass restrictions via REST Call of pcs, in order to escalate his privileges...
RHEL: privilege escalation via policycoreutils
An attacker can bypass restrictions via policycoreutils of RHEL, in order to escalate his privileges...
xdg-user-dirs: privilege escalation via Ignored System Umask
An attacker can bypass restrictions via Ignored System Umask of xdg-user-dirs, in order to escalate his privileges...
Linux kernel: memory corruption via DMA Allocation
An attacker can generate a memory corruption via DMA Allocation of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
RHEL: denial of service via truncate_inode_pages_range
An attacker can generate a fatal error via truncate_inode_pages_range() of RHEL, in order to trigger a denial of service...
Linux kernel: out-of-bounds memory reading via hidp_connection_add
An attacker can force a read at an invalid address via hidp_connection_add() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
NetBSD: multiple vulnerabilities via Network Stack
An attacker can use several vulnerabilities via Network Stack of NetBSD...
NetBSD: privilege escalation via Xen-amd64
An attacker can bypass restrictions via Xen-amd64 of NetBSD, in order to escalate his privileges...
pjproject: integer overflow via ioqueue
An attacker can generate an integer overflow via ioqueue of pjproject, in order to trigger a denial of service, and possibly to run code...
pjproject: integer overflow via SIP Message
An attacker can generate an integer overflow via SIP Message of pjproject, in order to trigger a denial of service, and possibly to run code...
Ubuntu: privilege escalation via ubuntu-release-upgrader
An attacker can bypass restrictions via ubuntu-release-upgrader of Ubuntu, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 808 809 810 811 812 813 814 815 816 818 820 821 822 823 824 825 826 827 828 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1069