The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Photo Gallery: file upload
An attacker can upload a malicious file on WordPress Photo Gallery, in order for example to upload a Trojan...
WordPress Revolution Slider: directory traversal
An attacker can traverse directories of WordPress Revolution Slider, in order to read a file outside the service root path...
Cisco 2900 Series ISR: denial of service via NBAR
An attacker can send a malicious IPv4 packet to Cisco 2900 Series ISR with NBAR, in order to trigger a denial of service...
Joomla Solidres: SQL injection
An attacker can use a SQL injection of Joomla Solidres, in order to read or alter data...
WordPress RedSteel: directory traversal
An attacker can traverse directories of WordPress RedSteel, in order to read a file outside the service root path...
Cisco Ironport: privilege escalation via Service Account
A local privileged attacker can connect to the Service Account of Cisco Ironport, in order to escalate his privileges...
Perl: integer overflow of Regex Backref
An attacker can generate an integer overflow in via a back reference in a Perl regular expression, in order to trigger a denial of service, and possibly to execute code...
GNU patch: directory traversal via symlink 2
An attacker can transmit to the victim a malicious diff file, to traverse directories of patch, in order to create a file outside the current directory...
GNU patch: directory traversal via rename
An attacker can transmit to the victim a malicious diff file, to traverse directories of patch, in order to create a file outside the current directory...
LibTIFF: multiple vulnerabilities
An attacker can use several vulnerabilities of LibTIFF...
LibTIFF: multiple vulnerabilities
An attacker can use several vulnerabilities of LibTIFF...
Linux kernel: module loading via AF_ALG and parenthesis
A local attacker can load a new kernel module, using a socket of type AF_ALG on the Linux kernel, in order to escalate his privileges...
Linux kernel: module loading via AF_ALG
A local attacker can load a new kernel module, using a socket of type AF_ALG on the Linux kernel, in order to escalate his privileges...
pfSense: Cross Site Request Forgery of WebGUI
An attacker can trigger a Cross Site Request Forgery in WebGUI of pfSense, in order to force the victim to perform operations...
HP SiteScope: privilege escalation
A remote attacker can use HP SiteScope, in order to escalate his privileges...
WordPress Platform: code execution
An attacker can use WordPress Platform, in order to execute PHP code...
WordPress PageLines: code execution
An attacker can use WordPress PageLines, in order to execute PHP code...
WordPress Contact Form: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Contact Form, in order to force the victim to perform operations...
Joomla Virtuemart: directory traversal
An attacker can traverse directories of Joomla Virtuemart, in order to read a file outside the service root path...
Node.js Marked: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js Marked, in order to execute JavaScript code in the context of the web site...
PHP: multiple vulnerabilities
An attacker can use several vulnerabilities of PHP...
Adobe Flash Player: bypassing ASLR
An attacker can bypass ASLR via Adobe Flash Player, in order to ease the exploitation of another vulnerability...
GNU patch: infinite loop of Line Number 2
An attacker can create a malicious patch file, to generate an infinite loop in patch, in order to trigger a denial of service...
Adobe Flash Player: use after free via UncompressViaZlibVariant
An attacker can invite the victim to display a malicious Adobe Flash Player animation, to force the usage of a freed memory area in ByteArray::UncompressViaZlibVariant, in order to trigger a denial of service, and possibly to execute code...
WordPress Easing Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easing Slider, in order to execute JavaScript code in the context of the web site...
Cisco Unified Communications Manager: directory traversal of Real-Time Monitoring Tool
An attacker can traverse directories in the Real-Time Monitoring Tool API of Cisco Unified Communications Manager, in order to read a file outside the service root path...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
JasPer: two vulnerabilities
An attacker can use several vulnerabilities of JasPer...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 482 483 484 485 486 487 488 489 490 492 494 495 496 497 498 499 500 501 502 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1011