The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 WordPress Core: four vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
2 TeamViewer: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on TeamViewer, in order to read or write data in the session...
1 Linux kernel: information disclosure via /proc/pid/stat
An attacker can bypass access restrictions to data via /proc/pid/stat of the Linux kernel, in order to obtain sensitive information...
2 Linux kernel: use after free via debugfs_remove
An attacker can force the usage of a freed memory area via debugfs_remove() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 Linux kernel: use after free via Perf_trace_lock_acquire
An attacker can force the usage of a freed memory area via Perf_trace_lock_acquire of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 Linux kernel: use after free via __blk_add_trace
An attacker can force the usage of a freed memory area via __blk_add_trace() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 Linux kernel: use after free via ext4_expand_extra_isize
An attacker can force the usage of a freed memory area via ext4_expand_extra_isize() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 Knot Resolver: denial of service via DNS Replies Many RR
An attacker can trigger a fatal error via DNS Replies Many RR of Knot Resolver, in order to trigger a denial of service...
2 Linux kernel: denial of service via Inter-Access Point Protocol
An attacker can trigger a fatal error via Inter-Access Point Protocol of the Linux kernel, in order to trigger a denial of service...
3 Node.js npm CLI: three vulnerabilities
An attacker can use several vulnerabilities of Node.js npm CLI...
2 Node.js bin-links: three vulnerabilities
An attacker can use several vulnerabilities of Node.js bin-links...
2 SPIP: SQL injection
An attacker can use a SQL injection of SPIP, in order to read or alter data...
2 Telerik UI for ASP.NET AJAX: code execution via RadAsyncUpload JavaScriptSerializer Deserialization
An attacker can use a vulnerability via RadAsyncUpload JavaScriptSerializer Deserialization of Telerik UI for ASP.NET AJAX, in order to run code...
2 OpenBSD: privilege escalation via ld.so suid/sgid LD_LIBRARY_PATH
An attacker can bypass restrictions via ld.so suid/sgid LD_LIBRARY_PATH of OpenBSD, in order to escalate his privileges...
3 Drupal Webform: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Webform...
2 Drupal Permissions by Term: information disclosure
An attacker can bypass access restrictions to data of Drupal Permissions by Term, in order to obtain sensitive information...
2 Drupal Modal Page: privilege escalation
An attacker can bypass restrictions of Drupal Modal Page, in order to escalate his privileges...
2 Drupal Taxonomy Access Fix: privilege escalation
An attacker can bypass restrictions of Drupal Taxonomy Access Fix, in order to escalate his privileges...
2 Drupal Smart Trim: Cross Site Scripting via Text Summary Fields
An attacker can trigger a Cross Site Scripting via Text Summary Fields of Drupal Smart Trim, in order to run JavaScript code in the context of the web site...
2 Node.js serialize-javascript: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js serialize-javascript, in order to run JavaScript code in the context of the web site...
2 Shadowsocks-libev: two vulnerabilities
An attacker can use several vulnerabilities of Shadowsocks-libev...
2 RSA Authentication Manager: vulnerability via iDRAC
A vulnerability via iDRAC of RSA Authentication Manager was announced...
2 WebSphere AS Liberty: Cross Site Scripting via Web UI
An attacker can trigger a Cross Site Scripting via Web UI of WebSphere AS Liberty, in order to run JavaScript code in the context of the web site...
2 RUGGEDCOM ROS: two vulnerabilities
An attacker can use several vulnerabilities of RUGGEDCOM ROS...
2 Siemens SIMATIC: Man-in-the-Middle via 102/tcp
An attacker can act as a Man-in-the-Middle via 102/tcp on Siemens SIMATIC, in order to read or write data in the session...
4 Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
2 Xen: memory corruption via AMD IOMMU Pagetables Dynamic Height
An attacker, inside a guest system, can trigger a memory corruption via AMD IOMMU Pagetables Dynamic Height of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
2 Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
2 Xen: memory corruption via Linear Pagetable Miscounts
An attacker, inside a guest system, can trigger a memory corruption via Linear Pagetable Miscounts of Xen, in order to trigger a denial of service, and possibly to run code on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 986 987 988 989 990 991 992 993 994 996