The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
TYPO3 ke_questionnaire: file reading
An attacker can read a file of TYPO3 ke_questionnaire, in order to obtain sensitive information...
NSS: non robust decoding via QuickDER
An attacker can create malicious ASN.1 data, which are recognized as valid by QuickDER of NSS, in order to bypass an antivirus for example...
WordPress Paid Memberships Pro: directory traversal
An attacker can traverse directories of WordPress Paid Memberships Pro, in order to read a file outside the service root path...
IIS: Cross Site Scripting of search
An attacker can trigger a Cross Site Scripting in the search feature of IIS, in order to execute JavaScript code in the context of the web site...
ppp: integer overflow of pppd/options.c
An attacker can generate an integer overflow in pppd/options.c of ppp, in order to trigger a denial of service, and possibly to execute code with root privileges...
LibYAML: denial of service via yaml_parser_save_simple_key
An attacker can create malformed YAML data, to generate an error in the yaml_parser_save_simple_key() function of LibYAML, in order to trigger a denial of service...
Xen: unreachable memory reading via REP MOVS
An attacker can force a read at an invalid address in REP MOVS of Xen, in order to trigger a denial of service...
Xen: denial of service via hypercall_xlat_continuation
An attacker can generate an error in hypercall_xlat_continuation() of Xen, in order to trigger a denial of service...
Centreon: two vulnerabilities
An attacker can use several vulnerabilities of Centreon...
TYPO3 WebDav for filemounts: information disclosure
An attacker can use TYPO3 WebDav for filemounts, in order to obtain sensitive information...
WordPress Apptha Video Gallery: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Apptha Video Gallery...
WordPress db-backup: directory traversal
An attacker can traverse directories of WordPress db-backup, in order to read a file outside the service root path...
WordPress Sexy Squeeze Pages: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Sexy Squeeze Pages, in order to execute JavaScript code in the context of the web site...
WordPress Html5 Mp3 Player with Playlist: information disclosure via playlist.php
An attacker can use playlist.php of WordPress Html5 Mp3 Player with Playlist, in order to obtain sensitive information...
Mutt: integer overflow of mutt_substrdup
An attacker can generate an integer overflow in the mutt_substrdup() function of Mutt, in order to trigger a denial of service, and possibly to execute code...
Cisco ASA: memory leak via SSL VPN
An attacker can create a memory leak in SSL VPN of Cisco ASA, in order to trigger a denial of service...
WordPress Ad-Manager: open redirect of track-click.php
An attacker can deceive the user via track-click.php of WordPress Ad-Manager, in order to redirect him to a malicious site...
WordPress Google Doc Embedder: SQL injection
An attacker can use a SQL injection of WordPress Google Doc Embedder, in order to read or alter data...
Joomla HDFLVPlayer: directory traversal
An attacker can traverse directories of Joomla HDFLVPlayer, in order to read a file outside the service root path...
Linux kernel: multiple vulnerabilities of LDT
An attacker can use several vulnerabilities of LDT of the Linux kernel...
HP-UX: privilege escalation via libpam_updbe
An attacker can use libpam_updbe of HP-UX, in order to escalate his privileges...
GNU patch: integer overflow of Line Number
An attacker can generate an integer overflow in GNU patch, in order to trigger a denial of service, and possibly to execute code...
Adobe Flash Player: use after free
An attacker can force the usage of a freed memory area in Adobe Flash Player, in order to trigger a denial of service, and possibly to execute code...
Cisco IOS XR: denial of service via lighttpd
An unauthenticated attacker can open several sessions on lighttpd of Cisco IOS XR, in order to trigger a denial of service...
Libksba, GnuPG: buffer overflow of ksba_oid_to_str
An attacker can generate a buffer overflow in the ksba_oid_to_str() function of Libksba, in order to trigger a denial of service, and possibly to execute code...
Cisco IOS XR: denial of service via LISP TCP
An attacker can send malicious LISP TCP data to Cisco IOS XR, in order to trigger a denial of service...
WordPress wpDataTables: file upload
An attacker can upload a malicious file on WordPress wpDataTables, in order for example to upload a Trojan...
WordPress wpDataTables: SQL injection
An attacker can use a SQL injection of WordPress wpDataTables, in order to read or alter data...
FLAC: two vulnerabilities
An attacker can use several vulnerabilities of FLAC...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 471 472 473 474 475 476 477 478 479 481 483 484 485 486 487 488 489 490 491 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1023