The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
libelf: directory traversal of read_long_names
An attacker can create a malicious ELF file, and invite the administrator to manipulate this file with a program linked to libelf, in order to traverse directories in the read_long_names() function of libelf, in order to write a file in the outside the filesystem root directory...
WordPress Frontend Uploader: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Frontend Uploader, in order to execute JavaScript code in the context of the web site...
PAN-OS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of PAN-OS, in order to execute JavaScript code in the context of the web site...
Joomla Visforms: information disclosure
An attacker can use Joomla Visforms, in order to obtain sensitive information...
NotePad++: buffer overflow of url
An attacker can generate a buffer overflow via an url in NotePad++, in order to trigger a denial of service, and possibly to execute code...
LibTIFF: unreachable memory reading via bmp2tiff
An attacker can force a read at an invalid address in bmp2tiff of libtiff, in order to trigger a denial of service...
libpng: buffer overflow of png_combine_row
An attacker can generate a buffer overflow in png_combine_row() of libpng, in order to trigger a denial of service, and possibly to execute code...
WordPress W3 Total Cache: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress W3 Total Cache, in order to execute JavaScript code in the context of the web site...
Cisco Prime Infrastructure: password disclosure via Quick Discovery
An authenticated attacker can read the Quick Discovery page of Cisco Prime Infrastructure, in order to obtain sensitive information...
Cisco ASA: password disclosure via Syslog Messages
An attacker can capture the Syslog message sent by Cisco ASA, in order to obtain sensitive information...
UnZip: multiple vulnerabilities
An attacker can use several vulnerabilities of UnZip...
NTP.org: multiple vulnerabilities
An attacker can use several vulnerabilities of NTP.org...
WordPress PictoBrowser: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress PictoBrowser, in order to execute JavaScript code in the context of the web site...
WordPress Post to Twitter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Post to Twitter, in order to execute JavaScript code in the context of the web site...
WordPress PWG Random: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress PWG Random, in order to execute JavaScript code in the context of the web site...
WordPress gSlideShow: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress gSlideShow, in order to execute JavaScript code in the context of the web site...
WordPress SimpleFlickr: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress SimpleFlickr, in order to execute JavaScript code in the context of the web site...
WordPress twimp-wp: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress twimp-wp, in order to execute JavaScript code in the context of the web site...
WordPress Simplelife: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Simplelife, in order to execute JavaScript code in the context of the web site...
WordPress Twitter LiveBlog: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Twitter LiveBlog, in order to execute JavaScript code in the context of the web site...
WordPress TweetScribe: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress TweetScribe, in order to execute JavaScript code in the context of the web site...
WordPress WP Limit Posts Automatically: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Limit Posts Automatically, in order to execute JavaScript code in the context of the web site...
WordPress WP Unique Article Header: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Unique Article Header, in order to execute JavaScript code in the context of the web site...
WordPress Live Forms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Live Forms, in order to execute JavaScript code in the context of the web site...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Linux kernel: bypassing ASLR via __switch_to
A local attacker can manipulate threads on the Linux kernel, in order to bypass ASLR...
Cisco IronPort Email: denial of service via Subject Header
An attacker can send an email with a long Subject header to Cisco IronPort Email, in order to trigger a denial of service...
JasPer: two vulnerabilities
An attacker can use several vulnerabilities of JasPer...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 476 477 478 479 480 481 482 483 484 486 488 489 490 491 492 493 494 495 496 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022