The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
phpMyAdmin: multiple vulnerabilities
An attacker can use several vulnerabilities of phpMyAdmin...
Wireshark 1.10: multiple vulnerabilities of dissectors
An attacker can use several vulnerabilities of dissectors of Wireshark 1.10...
Wireshark 1.8: multiple vulnerabilities of dissectors
An attacker can use several vulnerabilities of dissectors of Wireshark 1.8...
ICU: multiple vulnerabilities of Font
An attacker can use several vulnerabilities in the font processing by ICU...
FreeBSD: file access via NFS mapall/maproot
When the NFS mapall/maproot option is used with the network/host option, an attacker can use a privileged login, in order to access to shared files with his rights...
ISC BIND: denial of service via KeyData
A remote attacker can send a malicious query to ISC BIND, in order to stop it...
IBM Domino: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM Domino...
OpenOffice: memory corruption via DOCM
An attacker can invite the victim to open a malicious DOCM document with OpenOffice to corrupt its memory, in order to trigger a denial of service, and possibly to execute code...
LibreOffice: denial of service via DOCM
An attacker can invite the victim to open a malicious DOCM document with LibreOffice, in order to trigger a denial of service...
Symantec Web Gateway: multiple vulnerabilities
An attacker can use several vulnerabilities of Symantec Web Gateway...
OpenOffice, LibreOffice: memory corruption via DOCM
An attacker can invite the victim to open a malicious DOC document with OpenOffice/LibreOffice to corrupt its memory, in order to trigger a denial of service, and possibly to execute code...
GnuPG, Libgcrypt: reading private key via L3 flush+reload
A local attacker can access to the processor L3 cache, in order to read 98% of the private key used by GnuPG...
Cisco ASA: Cross Site Scripting of WebVPN
An attacker can trigger a Cross Site Scripting in WebVPN of Cisco ASA, in order to execute JavaScript code in the context of the web site...
Apache Subversion: denial of service via mod_dav_svn
An attacker can use a query using a revision root, which triggers an assertion error in Apache Subversion mod_dav_svn, in order to trigger a denial of service...
HP LoadRunner: multiple vulnerabilities
An attacker can use several vulnerabilities of HP LoadRunner...
Drupal Scald: Cross Site Scripting of Atom
An attacker can trigger a Cross Site Scripting in Drupal Scald, in order to execute JavaScript code in the context of the web site...
Xen: denial of service via HVM Caching
An attacker can use the memory to slow down the Xen host system, in order to trigger a denial of service...
WordPress Duplicator: Cross Site Scripting of installer.cleanup.php
An attacker can trigger a Cross Site Scripting in installer.cleanup.php of WordPress Duplicator, in order to execute JavaScript code in the context of the web site...
Cisco Unified MeetingPlace Web Conferencing: information disclosure
An attacker can bypass access restrictions of Cisco Unified MeetingPlace Web Conferencing, in order to obtain sensitive information...
McAfee Network Threat Behavior Analysis: multiple vulnerabilities
An attacker can use two vulnerabilities of McAfee Network Threat Behavior Analysis...
WordPress Download Monitor: Cross Site Scripting of p/sort
An attacker can trigger a Cross Site Scripting in p/sort of WordPress Download Monitor, in order to execute JavaScript code in the context of the web site...
Linux kernel: denial of service via ip6_append_data_mtu
A local attacker can send IPv6 data with UDP_CORK and IPV6_MTU, in order to stop the kernel...
Linux kernel: denial of service via ip6_push_pending_frames
A local attacker can send mixed IPv4/IPv6 data with UDP_CORK, in order to stop the kernel...
LibRaw: use after free via full-color
An attacker can use a full-color image to free a memory area twice in LibRaw, in order to trigger a denial of service, and possibly to execute code...
LibRaw: buffer overflow of exposure
An attacker can generate a buffer overflow in the Exposure correction code of LibRaw, in order to trigger a denial of service, and possibly to execute code...
Dell OpenManage Server Administrator: redirect via file
An attacker can use the "file" parameter of Dell OpenManage Server Administrator, in order to redirect the victim to a malicious site...
WordPress Citizen Space: Cross Site Scripting of citizenspace_url
An attacker can trigger a Cross Site Scripting in citizenspace_url of WordPress Citizen Space, in order to execute JavaScript code in the context of the web site...
Apache HTTP Server: vulnerability of mod_session_dbd
A vulnerability was announced in the mod_session_dbd module of Apache HTTP Server...
libvirt: denial of service via qemuAgentCommand
An attacker can dereference a NULL pointer in the qemuAgentCommand() function of libvirt, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 386 387 388 389 390 391 392 393 394 396 398 399 400 401 402 403 404 405 406 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050