The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Slideshow Gallery: file upload
An attacker can upload a malicious file on WordPress Slideshow Gallery, in order for example to upload a Trojan...
Net-SNMP: denial of service via snmptrapd
An attacker can send a malicious SNMP TRAP packet to snmptrapd of Net-SNMP with "-OQ", in order to trigger a denial of service...
Perl Clipboard: file corruption via clipedit
A local attacker can create a symbolic link named /tmp/clipedit$$, in order to alter the pointed file, with privileges of Perl Clipboard clipedit...
VMware: multiple vulnerabilities of vm-support
An attacker can use several vulnerabilities of vm-support of VMware...
IBM DB2 10.5: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM DB2 10.5...
WordPress ShortCode: information disclosure via force-download.php
An attacker can use force-download.php of WordPress ShortCode, in order to obtain sensitive information...
pfSense: multiple vulnerabilities
An attacker can use several vulnerabilities of pfSense...
F5 BIG-IP: read-write access via ConfigSync
An unauthenticated attacker can connect to the ConfigSync service of F5 BIG-IP, in order to read or alter files, for example to log in as root via ssh...
MIT krb5: use after free via SPNEGO init_ctx_reselect
An attacker can use a freed memory area in SPNEGO init_ctx_reselect() of MIT krb5, in order to trigger a denial of service, and possibly to execute code...
Squid: denial of service via Range
An attacker can send a malicious Range query to Squid, in order to trigger a denial of service...
Drupal Rules Link: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Rules Link, in order to execute JavaScript code in the context of the web site...
NetBSD: denial of service via modctl
A local attacker can use modctl of NetBSD, in order to trigger a denial of service...
NetBSD: multiple vulnerabilities of COMPAT_
An attacker can use several vulnerabilities of COMPAT_ of NetBSD...
NetBSD: multiple vulnerabilities of execve
An attacker can use several vulnerabilities of execve of NetBSD...
Joomla Spider: SQL injection
An attacker can use a SQL injection of Joomla Spider, in order to read or alter data...
WordPress MailPoet Newsletters: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress MailPoet Newsletters, in order to force the victim to perform operations...
QEMU: denial of service via vmstate_xhci_event
A local attacker can use vmstate_xhci_event of QEMU, in order to trigger a denial of service...
Apache Subversion: information disclosure via MD5 Cache
A local attacker can trigger a MD5 collision in the cache of Apache Subversion, in order to obtain sensitive information...
Linux kernel: denial of service via ISOFS
A local attacker can mount a malicious ISOFS image on the Linux kernel, in order to trigger a denial of service...
glibc: buffer overflow of __gconv_translit_find
An attacker can generate a buffer overflow in the __gconv_translit_find() function of the glibc, in order to trigger a denial of service, and possibly to execute code...
IPv6: denial of service via Filtered Extension Headers
An attacker can send a spoofed ICMPv6 packet to an IPv6 implementation filtering extension headers, in order to trigger a denial of service...
WordPress KenBurner Slider: information disclosure via kbslider_show_image
An attacker can use kbslider_show_image of WordPress KenBurner Slider, in order to obtain sensitive information...
Cisco IOS XR: denial of service via NetFlow Sampling
When NetFlow Sampling is enabled, an attacker can send a packet with a multicast destination MAC address to Cisco IOS XR, in order to trigger a denial of service...
F5 BIG-IP: Cross Site Scripting of tmui/dashboard/echo.jsp
An attacker can trigger a Cross Site Scripting in tmui/dashboard/echo.jsp of F5 BIG-IP, in order to execute JavaScript code in the context of the web site...
WordPress Simple Page Ordering: Cross Site Scripting of Sort by Order
An attacker can trigger a Cross Site Scripting via a link to request a sort in WordPress Simple Page Ordering, in order to execute JavaScript code in the context of the web site...
Qemu: information disclosure via pci_read
A local attacker can read a memory fragment of Qemu, in order to obtain information that may be sensitive...
OpenOffice, LibreOffice: two vulnerabilities
An attacker can use two vulnerabilities of Apache OpenOffice and LibreOffice...
PHP: multiple vulnerabilities
An attacker can use three vulnerabilities of PHP...
Symantec Encryption Desktop: denial of service via compressed encrypted e-mail
An attacker can send special compressed messages to a user of Symantec Encryption Desktop, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 455 456 457 458 459 460 461 462 463 465 467 468 469 470 471 472 473 474 475 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1011