The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Apache httpd: memory leak via WinNT MPM
An attacker can create a memory leak in WinNT MPM of Apache httpd, in order to trigger a denial of service...
Apache httpd: denial of service via mod_proxy
An attacker can send a malicious query to mod_proxy of Apache httpd, in order to trigger a denial of service...
Apache httpd: denial of service via mod_deflate
An attacker can send special data to Apache httpd with mod_deflate as an Input Filter, in order to trigger a denial of service...
Apache httpd: buffer overflow of mod_status
An attacker can generate a buffer overflow in mod_status of Apache httpd, in order to trigger a denial of service, and possibly to execute code...
Joomla com_youtubegallery: SQL injection
An attacker can use a SQL injection of Joomla com_youtubegallery, in order to read or alter data...
Cisco Unified Contact Center Enterprise: directory traversal
An attacker can traverse directories of Cisco Unified Contact Center Enterprise, in order to read a file in the service root path...
Linux kernel: privilege escalation via SOL_PPPOL2TP
An attacker can use a L2TP socket when the Linux kernel is compiled with SOL_PPPOL2TP, in order to escalate his privileges...
Drupal FileField: information disclosure
An attacker can use Drupal FileField, in order to obtain sensitive information...
Drupal Password Policy: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Password Policy...
Drupal: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal...
Puppet Enterprise: multiple vulnerabilities
An attacker can use several vulnerabilities of Puppet Enterprise...
Symfony: directory traversal via _locale
An attacker can traverse directories via _locale of Symfony, in order to read a file outside the service root path...
WordPress WPTouch: file upload
An attacker can upload a malicious file on WordPress WPTouch, in order for example to upload a Trojan...
HP Data Protector: shell command execution
A remote attacker can connect to HP Data Protector, in order to execute code...
Citrix XenServer: two vulnerabilities
An attacker can use several vulnerabilities of Citrix XenServer...
MySQL: several vulnerabilities of July 2014
Several vulnerabilities of Oracle MySQL were announced in July 2014...
Oracle Solaris: several vulnerabilities of July 2014
Several vulnerabilities of Oracle Solaris were announced in July 2014...
Oracle Fusion: several vulnerabilities of July 2014
Several vulnerabilities of Oracle Fusion were announced in July 2014...
Oracle Java: multiple vulnerabilities of July 2014
An attacker can use several vulnerabilities of Oracle Java...
Oracle Database: several vulnerabilities of July 2014
Several vulnerabilities of Oracle Database were announced in July 2014...
Cisco IOS XR: denial of service via MPLS
An attacker can send MPLS packets to a BVI of Cisco IOS XR on ASR 9000, in order to trigger a denial of service...
WordPress Compfight: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Compfight, in order to execute JavaScript code in the context of the web site...
WordPress Plugin CopySafe PDF Protection: file upload
An attacker can upload a malicious file on WordPress Plugin CopySafe PDF Protection, in order for example to upload a Trojan...
WordPress Download Manager: file upload
An attacker can upload a malicious file on WordPress Download Manager, in order for example to upload a Trojan...
WordPress Tidio Gallery: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Tidio Gallery...
Cisco ASA: denial of service via CIFS Share Enumeration
An attacker can send a special CIFS reply to Cisco ASA, in order to trigger a denial of service...
WordPress wp-easycart: information disclosure via phpinfo
An attacker can use WordPress wp-easycart, in order to obtain sensitive information...
WordPress cross-rss: directory traversal
An attacker can traverse directories of WordPress cross-rss, in order to read a file outside the service root path...
WordPress Tera-chart: directory traversal
An attacker can traverse directories of WordPress Tera-chart, in order to read a file outside the service root path...
WordPress enl-newsletter: SQL injection
An attacker can use a SQL injection of WordPress enl-newsletter, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 449 450 451 452 453 454 455 456 457 459 461 462 463 464 465 466 467 468 469 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1116