The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Cisco IOS XR: denial of service via MPLS
An attacker can trigger a fatal error via MPLS of Cisco IOS XR, in order to trigger a denial of service...
2 Cisco Prime Infrastructure: SQL injection via Web UI
An attacker can use a SQL injection via the Web UI of Cisco Prime Infrastructure, in order to read or alter data...
4 Cisco Prime Infrastructure: code execution via the Web UI
An attacker can use a vulnerability via the Web UI of Cisco Prime Infrastructure, in order to run code...
3 WebSphere AS Network Deployment: code execution via Serialized Object
An attacker can use a vulnerability via Serialized Object of WebSphere AS Network Deployment, in order to run code...
2 Node.js fstream: privilege escalation via File Overwrite
An attacker can bypass restrictions via File Overwrite of Node.js fstream, in order to escalate his privileges...
3 Node.js modules: code execution via Invalid Package Name
An attacker can use a vulnerability via Invalid Package Name of Node.js modules, in order to run code...
2 Node.js web3: privilege escalation via Insecure Credential Storage
An attacker can bypass restrictions via Insecure Credential Storage of Node.js web3, in order to escalate his privileges...
2 eZ Publish Legacy: Cross Site Scripting via DB Handler Error Messages
An attacker can trigger a Cross Site Scripting via DB Handler Error Messages of eZ Publish Legacy, in order to run JavaScript code in the context of the web site...
3 Google Chrome: memory corruption
An attacker can trigger a memory corruption of Google Chrome, in order to trigger a denial of service, and possibly to run code...
2 WordPress Launcher: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Launcher, in order to run JavaScript code in the context of the web site...
2 Node.js modules: Discord account spoofing via malicious packages
An attacker spread a malware hidden in some Node.js modules, in order to steal Discord access tokens...
2 Node.js bootbox: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js bootbox, in order to run JavaScript code in the context of the web site...
2 VMware Workstation: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of VMware Workstation, in order to execute code...
2 Linux kernel: privilege escalation via sctp/cgroup
An attacker can bypass restrictions via sctp/cgroup of the Linux kernel, in order to escalate his privileges...
1 QEMU: NULL pointer dereference via power_mem_ops
An attacker can force a NULL pointer to be dereferenced via power_mem_ops of QEMU, in order to trigger a denial of service...
2 FreeBSD: denial of service via IPv6
An attacker can send fragmented IPv6 packets to FreeBSD, in order to trigger a denial of service...
1 FreeBSD: adress based IP filtering bypass
An attacker can tamper with the IP addresse of a an IP packet nested in an ICMP one, in order to bypass the FreeBSD packet filter...
2 Lemonldap-ng: privilege escalation via the option tokenUseGlobalStorage
An attacker can bypass restrictions via tokenUseGlobalStorage of Lemonldap::ng, in order to escalate his privileges...
4 Windows: vulnerabilities of May 2019
An attacker can use several vulnerabilities of Microsoft products...
1 Intel processors: information disclosure via performance measurement
An attacker can measure performances of his process, in order to get sensitive information about other process or, if the host is virtualized, about other guest systems...
2 Microsoft Visual Studio: privilege escalation via Standard Collector
An attacker can bypass restrictions via Standard Collector of Microsoft Visual Studio, in order to escalate his privileges...
2 Microsoft SQL Server 2017: information disclosure
An attacker can bypass access restrictions to data of Microsoft SQL Server 2017, in order to obtain sensitive information...
3 Microsoft Office: vulnerabilities of May 2019
An attacker can use several vulnerabilities of Microsoft products...
3 Microsoft .NET: vulnerabilities of May 2019
An attacker can use several vulnerabilities of Microsoft products...
4 Microsoft IE/Edge: vulnerabilities of May 2019
An attacker can use several vulnerabilities of Microsoft products...
4 Adobe Flash Player: use after free
An attacker can force the usage of a freed memory area of Adobe Flash Player, in order to trigger a denial of service, and possibly to run code...
3 Adobe Acrobat/Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat/Reader...
2 Joomla oziogallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla oziogallery, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 924 925 926 927 928 929 930 931 932 934 936 937 938 939 940 941 942 943 944 961 981 995