The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Mollom: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Mollom, in order to execute JavaScript code in the context of the web site...
Zend Framework: two vulnerabilities
An attacker can use several vulnerabilities of Zend Framework...
WordPress WP-Ban: bypassing the blacklist
An attacker can bypass WordPress WP-Ban, in order to access to the web service...
WordPress WooCommerce: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WooCommerce, in order to execute JavaScript code in the context of the web site...
WordPress Login Widget With Shortcode: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Login Widget With Shortcode, in order to force the victim to perform operations...
Linux kernel: NULL pointer dereference via SMB2_tcon
An attacker can force a NULL pointer to be dereferenced in the SMB2_tcon() function of the Linux kernel, in order to trigger a denial of service...
Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Embarcadero Delphi: buffer overflow of VCL
An attacker can generate a buffer overflow in the VCL library of Embarcadero Delphi, in order to trigger a denial of service, and possibly to execute code...
OSSEC: SSH access on agents
An attacker can read passwords of the Agentless Monitoring of OSSEC, in order to login with SSH on monitored servers...
Adobe Acrobat, Reader: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Acrobat, Reader...
D-Bus: multiple vulnerabilities
An attacker can use several vulnerabilities of D-Bus...
nginx: reusing SSL session
An attacker can, in some configurations of nginx, obtain an access to the session of another SSL user...
Vtiger CRM: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Vtiger CRM, in order to force the victim to perform operations...
WordPress Wordfence: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Wordfence, in order to execute JavaScript code in the context of the web site...
Linux kernel: infinite loop of __udf_read_inode
An attacker can mount an UDF file system, to generate a large recursion in __udf_read_inode(), in order to trigger a denial of service of the Linux kernel...
Linux kernel: unreachable memory reading via SO_KEEPALIVE
An attacker can force a read at an invalid address via SO_KEEPALIVE on the Linux kernel, in order to trigger a denial of service...
phpMyAdmin: Cross Site Scripting of Micro History
An attacker can trigger a Cross Site Scripting in Micro History of phpMyAdmin, in order to execute JavaScript code in the context of the web site...
WordPress WP Photo Album Plus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Photo Album Plus, in order to execute JavaScript code in the context of the web site...
Joomla Spider Form Maker: SQL injection
An attacker can use a SQL injection of Joomla Spider Form Maker, in order to read or alter data...
automake: removing directory via dash
A local attacker can create a symbolic link named /tmp/ins-$$, in order to force the deletion of a directory named "d", with privileges of automake...
Joomla Spider Contacts: SQL injection
An attacker can use a SQL injection of Joomla Spider Contacts, in order to read or alter data...
WordPress Trinity: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress Trinity, in order to read a file outside the service root path...
WordPress Rich Counter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Rich Counter, in order to execute JavaScript code in the context of the web site...
Linux kernel: multiple vulnerabilities of USB Driver
An attacker can use several vulnerabilities of USB Driver of the Linux kernel...
WordPress Photo Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Photo Gallery, in order to execute JavaScript code in the context of the web site...
WordPress WP Support Plus Responsive Ticket System: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress WP Support Plus Responsive Ticket System...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 459 460 461 462 463 464 465 466 467 469 471 472 473 474 475 476 477 478 479 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020