The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle Java: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...
Oracle Outside In Technology: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...
Oracle Fusion Middleware: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...
Oracle Berkeley DB: denial of service via Data Store
An attacker can trigger a fatal error via Data Store of Oracle Berkeley DB, in order to trigger a denial of service...
Oracle Database: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...
Cacti: Cross Site Scripting via SNMP Community String
An attacker can trigger a Cross Site Scripting via SNMP Community String of Cacti, in order to run JavaScript code in the context of the web site...
Python urllib3: information disclosure via CRLF Injection
An attacker can bypass access restrictions to data via CRLF Injection of Python urllib3, in order to obtain sensitive information...
PC/SC Lite: memory leak via SCardEstablishContextTH
An attacker can create a memory leak via SCardEstablishContextTH() of PC/SC Lite, in order to trigger a denial of service...
libxslt: read/write via xsltCheckRead/xsltCheckWrite
An attacker can bypass access restrictions to data via xsltCheckRead/xsltCheckWrite() of libxslt, in order to obtain sensitive information, or to alter data...
libvirt: information disclosure via Guest Agent API
An attacker can bypass access restrictions to data via Guest Agent API of libvirt, in order to obtain sensitive information...
Node.js simple-markdown: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js simple-markdown, in order to run JavaScript code in the context of the web site...
GraphicsMagick: five vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
HP LaserJet: code execution via Signature Validation Bypass
An attacker can use a vulnerability via Signature Validation Bypass of HP LaserJet, in order to run code...
Pulse Connect Secure, Pulse Secure Desktop: information disclosure via Session Cookies Reading
An attacker can bypass access restrictions to data via Session Cookies Reading of Pulse Connect Secure and Pulse Secure Desktop, in order to obtain sensitive information...
VMware ESXi/Workstation: three vulnerabilities
An attacker can use several vulnerabilities of VMware ESXi/Workstation...
Checkstyle: information disclosure via External DTD
An attacker can bypass access restrictions to data via External DTD of Checkstyle, in order to obtain sensitive information...
jQuery Core: privilege escalation via Object.prototype Pollution
An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges...
Node.js Modules: multiple vulnerabilities
An attacker can use several vulnerabilities of Node.js Modules...
Joomla JB Bus: SQL injection
An attacker can use a SQL injection of Joomla JB Bus, in order to read or alter data...
Joomla Pinterest Clone Social Pinboard: SQL injection
An attacker can use a SQL injection of Joomla Pinterest Clone Social Pinboard, in order to read or alter data...
FreeRADIUS: privilege escalation via EAP-PWD
An attacker can bypass restrictions via EAP-PWD of FreeRADIUS, in order to escalate his privileges...
lighttpd: denial of service via url-path-2f-decode
An attacker can trigger a fatal error via url-path-2f-decode of lighttpd, in order to trigger a denial of service...
Junos OS SRX5000: denial of service via fxp0 Packet
An attacker can trigger a fatal error via fxp0 Packet of Junos OS SRX5000, in order to trigger a denial of service...
Junos OS: denial of service via RPD SNMP
An attacker can send malicious RPD SNMP packets to Junos OS, in order to trigger a denial of service...
Junos OS EX4300-MP: information disclosure via Transit Network Traffic Control Plane
An attacker can bypass access restrictions to data via Transit Network Traffic Control Plane of Junos OS EX4300-MP, in order to obtain sensitive information...
Junos OS: denial of service via BGP Peer Restarts
An attacker can trigger a fatal error via BGP Peer Restarts of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via BGP Tracing
An attacker can trigger a fatal error via BGP Tracing of Junos OS, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 915 916 917 918 919 920 921 922 923 925 927 928 929 930 931 932 933 934 935 941 961 981 1001 1021 1041 1061 1081 1101 1103