The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress HMS Testimonials: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress HMS Testimonials...
Joomla redSHOP: SQL injection of addtocompare
An attacker can use a SQL injection in addtocompare of Joomla redSHOP, in order to read or alter data...
Linux kernel: denial of service via ARM64
When the Linux kernel is compiled for ARM64, a local attacker can use a register via CP14/CP15, in order to trigger a denial of service...
Symfony: two vulnerabilities
An attacker can use several vulnerabilities of Symfony...
Apache httpd suEXEC: file reading via symlink
An attacker can create a symbolic link in a directory using suEXEC, in order to read a file with privileges of the Apache httpd user...
Drupal Monster Menus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Monster Menus, in order to execute JavaScript code in the context of the web site...
Drupal Organic Groups: privilege escalation
An attacker can bypass access restrictions of Drupal Organic Groups, in order to escalate his privileges...
Drupal Authenticated User Page Caching: information disclosure
An attacker can use of Drupal Authenticated User Page Caching, in order to obtain sensitive information...
Drupal Persona: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Persona, in order to force the victim to perform operations...
Drupal RESTful Web Services: privilege escalation
An attacker can bypass access restrictions of Drupal RESTful Web Services, in order to escalate his privileges...
Nagios plugins: file corruption via check_ipxping.c
A local attacker can create a symbolic link during the usage of ipxping by Nagios, in order to corrupt a file with privileges of the service...
Nagios: file corruption via rss-newsfeed.php
A local attacker can create a symbolic link during the usage of rss-newsfeed.php of Nagios, in order to corrupt a file with privileges of the service...
WordPress Booking Calendar: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Booking Calendar, in order to force the victim to perform operations...
Joomla Jomres: two vulnerabilities
An attacker can use several vulnerabilities of Joomla Jomres...
Cacti: two vulnerabilities
An attacker can use several vulnerabilities of Cacti...
Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
Linux kernel: denial of service via CLONE_NEWUSER
When User Namespace is enabled, a local attacker can use unshare(CLONE_NEWUSER), in order to trigger a denial of service...
WordPress Usernoise: Cross Site Scripting of feedback
An attacker can trigger a Cross Site Scripting in WordPress Usernoise, in order to execute JavaScript code in the context of the web site...
Stonesoft SSL VPN: redirection
An attacker can use the web site of Stonesoft SSL VPN, in order to deceive the victim, and to redirect him to a malicious web site...
WordPress Xhanch My Twitter: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Xhanch My Twitter, in order to force the victim to perform operations...
Joomla JSE Event: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla JSE Event, in order to execute JavaScript code in the context of the web site...
Joomla com_sectionex: SQL injection
An attacker can use a SQL injection of Joomla com_sectionex, in order to read or alter data...
WordPress Chat: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Chat, in order to execute JavaScript code in the context of the web site...
WordPress BulletProof Security: Cross Site Scripting of 40x.php
An attacker can trigger a Cross Site Scripting in WordPress BulletProof Security, in order to execute JavaScript code in the context of the web site...
OpenCA PKI: memory leak via OpenSSL
An attacker can create a memory leak in the OpenSSL module of OpenCA PKI, in order to trigger a denial of service...
Cisco Unified Communications Manager: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Unified Communications Manager, in order to force the victim to perform operations...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 388 389 390 391 392 393 394 395 396 398 400 401 402 403 404 405 406 407 408 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1057