The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
systemd: multiple vulnerabilities
An attacker can use several vulnerabilities of systemd...
VLC: buffer overflow of LOASParse
An attacker can generate a buffer overflow in the LOASParse() function of VLC, in order to trigger a denial of service, and possibly to execute code...
Xen: information disclosure via FBLD
An attacker located in a guest system can use the FBLD instruction, to read data from other Xen guests, in order to obtain sensitive information...
Xen: privilege escalation via 64-bit PV Migration
An attacker located in a 64 bit PV system which is migrated can access to Xen memory, in order to escalate his privileges...
Xen: information disclosure via I/O Emulation
An attacker located in a HVM guest can use input/output operations, to read Xen memory, in order to obtain sensitive information...
IBM SPSS Modeler: denial of service via XML
An attacker can invite the victim to open a malicious XML document with IBM SPSS Modeler, in order to trigger a denial of service...
WordPress FireStorm Professional Real Estate: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress FireStorm Professional Real Estate, in order to execute JavaScript code in the context of the web site...
WordPress Platinum SEO Pack: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Platinum SEO Pack, in order to execute JavaScript code in the context of the web site...
Linux kernel: memory corruption via IPv6 UFO
A local attacker can send IPv6/UDP packets, to generate a memory corruption in the Linux kernel, in order to trigger a denial of service, and possibly to execute code...
Joomla com_seminar: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla com_seminar, in order to execute JavaScript code in the context of the web site...
Joomla My Blog: SQL injection
An attacker can use a SQL injection of Joomla My Blog, in order to read or alter data...
Joomla Mijo Analytics: SQL injection
An attacker can use a SQL injection of Joomla Mijo Analytics, in order to read or alter data...
qemu: denial of service via virtio-pci
An attacker in a guest system can unplug a PCI device, in order to trigger a denial of service on the qemu host...
Joomla com_zimbcomment: file reading
An attacker can traverse directories of Joomla com_zimbcomment, in order to read a file outside the root path...
Cisco IOS XR: denial of service via PPTP-ALG
An attacker can send PPTP-ALG packets to Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS: denial of service via T1/E1 Driver
An attacker can send a data burst on a T1/E1 interface of Cisco IOS, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via RSVP
An attacker can send an UDP RSVP packet to Cisco IOS or IOS XE, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via NTP
An attacker configured as a MSDP peer can send a Multicast Source Discovery Protocol Source-Active message containing an NTP packet to Cisco IOS or IOS XE, in order to trigger a denial of service...
Cisco IOS: multiple vulnerabilities of NAT
An attacker can use several vulnerabilities of the Network Address Translation of Cisco IOS...
Cisco IOS: denial of service via IPv6 Virtual Fragmentation Reassembly
An attacker can send a stream of IPv6 packets, to generate a race error in the IPv6 Virtual Fragmentation Reassembly feature of Cisco IOS, in order to trigger a denial of service...
Cisco IOS, IOS XE: memory leak via IKE
An attacker can create a memory leak in the IKE packets processing by Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via DHCP
An attacker can send a malicious DHCP packet to Cisco IOS or IOS XE with a DHCP service enabled, in order to trigger a denial of service...
Cisco IOS: denial of service via ZBFW
An attacker can send a malformed HTTP packet, to Cisco IOS with ZBFW and HTTP ALG inspection or Content Filtering, in order to trigger a denial of service...
Blue Coat ProxySG: memory leak via Pre-Fetch
An attacker can create a memory leak in the Pre-Fetch feature of Blue Coat ProxySG, in order to trigger a denial of service...
WordPress Custom Website Data: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Custom Website Data, in order to execute JavaScript code in the context of the web site...
WordPress WP Ultimate Email Marketer: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Ultimate Email Marketer, in order to execute JavaScript code in the context of the web site...
WordPress Sharebar: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Sharebar, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 397 398 399 400 401 402 403 404 405 407 409 410 411 412 413 414 415 416 417 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090