The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SAP DevInfPage: privilege escalation via J2EE Servlet
An attacker can access to a J2EE Servlet of SAP DevInfPage, in order to escalate his privileges...
SAP DI Log Viewer: privilege escalation via J2EE Servlet
An attacker can access to a J2EE Servlet of SAP DI Log Viewer, in order to escalate his privileges...
OTRS Help Desk: two vulnerabilities
An attacker can use several vulnerabilities of OTRS Help Desk...
RSA Authentication Manager: password leak via log file
An attacker can get passwords for RSA Authentication Manager from the application debug file...
ESRI ArcGIS for Desktop: SQL injection
An attacker can use a SQL injection in ESRI ArcGIS for Desktop, in order to read or alter data...
WordPress: information disclosure via Search N Save
An attacker can read the error log in Search N Save of WordPress, in order to obtain sensitive information...
WordPress: Cross Site Scripting of EzyOnlineBookings
An attacker can trigger a Cross Site Scripting in EzyOnlineBookings of WordPress, in order to execute JavaScript code in the context of the web site...
Opera: denial of service by memory exhaustion
An attacker can force memory exhaustion in the JavaScript interpreter of Opera, in order to trigger a denial of service...
Xorg: denial of service via XOpenDisplay
An attacker can force an endless wait in XOpenDisplay of Xorg, in order to trigger a denial of service...
WordPress Sharebar plugin: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery in the WordPress plugin Sharebar, in order to force the victim to perform operations...
AVAST Antivirus: privilege escalation via HTML injection
An attacker can type HTML with special links in the man machine interface of AVAST Antivirus, in order to escalate his privileges...
Quagga: buffer overflow of the OSPF daemon via LSA
An attacker can generate a buffer overflow in the processing of advertisements by the OSFP daemon of Quagga, in order to trigger a denial of service, and possibly to execute code...
AIX: illicit access to files via the tftp client
An attacker can read and write files with the tftp client of AIX, in order to, for instance, get sensitive information or increase his privileges...
Linux kernel: denial of service via Ceph
A remote attacker can send an invalid Ceph auth_reply message to the Linux kernel, in order to trigger a denial of service...
WordPress BuddyPress Extended Friendship Request: SQL injection of friendship_request_message
An attacker can use a code injection via friendship_request_message of WordPress BuddyPress Extended Friendship Request, in order to read or alter data...
WordPress Dropdown Menu Widget: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery in WordPress Dropdown Menu Widget, in order to force the victim to perform operations...
Linux kernel: information disclosure via AF_KEY
An attacker can use an AF_KEY socket, in order to obtain sensitive information on the Linux kernel...
WordPress Plugin Link Farm Evolution, Search N Save: Cross Site Scripting of ZeroClipboard.swf
An attacker can trigger a Cross Site Scripting in ZeroClipboard.swf of Link Farm Evolution and Search N Save for WordPress, in order to execute JavaScript code in the context of the web site...
WordPress Category Grid View Gallery Plugin: Cross Site Scripting of /includes/CatGridPost.php
An attacker can trigger a Cross Site Scripting in includes/CatGridPost.php of WordPress Category Grid View Gallery Plugin, in order to execute JavaScript code in the context of the web site...
WordPress WP Feed Plugin: SQL injection of news_dt.php
An attacker can use a SQL injection in news_dt.php of WordPress WP Feed Plugin, in order to read or alter data...
Linux kernel: denial of service via ip6_sk_dst_check
An attacker can send IPv6 packets to an IPv4 destination from a Linux host, in order to trigger a denial of service...
IBM WebSphere AS 6.1: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM WebSphere AS 6.1...
IBM WebSphere AS 8.0: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM WebSphere AS 8.0...
libvirt: use after free via virConnectListAllInterfaces
An attacker can use a freed memory area in the virConnectListAllInterfaces function of libvirt, in order to trigger a denial of service, and possibly to execute code...
Linux kernel: information disclosure via AF_KEY
An attacker can use an AF_KEY socket, in order to obtain sensitive information on the Linux kernel...
Cisco Web Security Appliance: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco Web Security Appliance...
Cisco Content Security Management Appliance: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco Content Security Management Appliance...
Cisco Email Security Appliance: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco Email Security Appliance...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 382 383 384 385 386 387 388 389 390 392 394 395 396 397 398 399 400 401 402 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050