The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: denial of service via CONFIG_AUDITSYSCALL
A local attacker can use a system call on a Linux kernel with CONFIG_AUDITSYSCALL, in order to trigger a denial of service...
kdelibs: man-in-the-middle via POP3 kioslave
An attacker can act as a man-in-the-middle between KMail and a POP3 server, in order to read or alter data...
Drupal Password Policy: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Password Policy...
Drupal Custom Meta: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Custom Meta, in order to execute JavaScript code in the context of the web site...
Drupal Course: information disclosure
An attacker can use Drupal Course, in order to obtain sensitive information...
Drupal Easy Breadcrumb: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Easy Breadcrumb, in order to execute JavaScript code in the context of the web site...
Drupal VideoWhisper Webcam Plugins: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal VideoWhisper Webcam Plugins, in order to execute JavaScript code in the context of the web site...
Linux kernel: denial of service via Punch Hole
A local attacker can use a mmap() during a Punch Hole by the Linux kernel, in order to trigger a denial of service...
WordPress Featured Comments: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Featured Comments, in order to force the victim to perform operations...
Perl: denial of service via Email-Address
An attacker can send a special email address to a program using the Email::Address module of Perl, in order to trigger a denial of service...
Linux kernel: privilege escalation via PR_SET_SECCOMP on MIPS
An attacker can call functions which should be forbidden by PR_SET_SECCOMP of the Linux kernel on MIPS, in order to escalate his privileges...
Microsoft Malware Protection Engine: denial of service
An attacker can send a malicious file to the Microsoft Malware Protection Engine, in order to trigger a denial of service...
Xen: information disclosure via Heap Memory
An attacker located in a guest system can read a memory fragment of Xen, in order to obtain sensitive information...
Xen: privilege escalation via xen-access.c
An attacker can use a program based on xen-access.c of Xen, in order to escalate his privileges...
Cisco ASA: information disclosure via WebVPN
An attacker can use a JavaScript file on WebVPN of Cisco ASA, in order to obtain sensitive information...
Symantec Web Gateway: multiple vulnerabilities
An attacker can use several vulnerabilities of Symantec Web Gateway...
Cisco IOS XE: read-write access via mDNS
An attacker can use mDNS of Cisco IOS XE, in order to read or alter data...
Asterisk: multiple vulnerabilities
An attacker can use several vulnerabilities of Asterisk...
glibc: use after free via posix_spawn_file_actions_addopen
An attacker can use a freed memory area in the implementation of the posix_spawn_file_actions_addopen() function in the glibc, in order to trigger a denial of service, and possibly to execute code...
Wireshark: denial of service via Frame Metadissector
An attacker can send a malicious packet to Wireshark, in order to trigger a denial of service...
Zend Framework: SQL injection of Zend_Db_Select
An attacker can use a SQL injection in Zend_Db_Select of Zend Framework, in order to read or alter data...
WordPress adminonline: file upload
An attacker can upload a malicious file on WordPress adminonline, in order for example to upload a Trojan...
PHP: buffer overflow of DNS TXT
An attacker can generate a buffer overflow of PHP via DNS TXT, in order to trigger a denial of service, and possibly to execute code...
NetScreen Firewall: denial of service via IPv6
An attacker can send malicious IPv6 packets to NetScreen Firewall, in order to trigger a denial of service...
NetScreen Firewall: denial of service via DNS Client
An attacker can return malicious DNS replies to NetScreen Firewall, in order to trigger a denial of service...
Junos Pulse SA, UAC: usage of weak SSL Cipher
An attacker can use a Man-in-the-Middle on Junos Pulse SA or UAC, in order to capture sessions...
Drupal Petitions: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Petitions, in order to force the victim to perform operations...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 444 445 446 447 448 449 450 451 452 454 456 457 458 459 460 461 462 463 464 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114