The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress iThemes Security: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress iThemes Security, in order to execute JavaScript code in the context of the web site...
WordPress Crayon Syntax Highlighter: directory traversal
An attacker can traverse directories of WordPress Crayon Syntax Highlighter, in order to read a file outside the service root path...
Abrt: privilege escalation via symlink
A local attacker can create a symbolic link when Abrt is run, in order to alter the pointed file, with privileges of the Linux kernel...
Abrt: privilege escalation via pipe
A local attacker can use the Abrt feature of the Linux kernel, in order to escalate his privileges...
Apport: privilege escalation via pipe
A local attacker can use the Apport feature of the Linux system, in order to escalate his privileges...
WordPress MiwoFTP: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress MiwoFTP, in order to force the victim to perform operations...
GnuTLS: use after free via CRL
An attacker can force the usage of a freed memory area in CRL of GnuTLS, in order to trigger a denial of service, and possibly to execute code...
Joomla Creative Contact Form: vulnerability
A vulnerability of Joomla Creative Contact Form was announced...
WordPress WP Statistics: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Statistics, in order to execute JavaScript code in the context of the web site...
Cisco Web Security Appliance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Web Security Appliance, in order to execute JavaScript code in the context of the web site...
Linux kernel: denial of service via GCM
An attacker can make the Linux kernel decrypt data with algorithm AES-GCM, in order to trigger a denial of service and perhaps run code with kernel privileges...
Debian, Ubuntu: denial of service via TCP Fast Open
A local attacker can use TCP Fast Open with the Linux kernel from Debian/Ubuntu, in order to trigger a denial of service...
Panda Antivirus, Internet Security: privilege escalation via Debug
A local attacker can debug the password verification process of Panda Antivirus or Internet Security, in order to alter the configuration...
ProFTPD: read-write access via mod_copy
An attacker can bypass access restrictions via mod_copy of ProFTPD, in order to read or alter files...
SQLite: three vulnerabilities
An attacker can use several vulnerabilities of SQLite...
Oracle MySQL: several vulnerabilities of April 2015
Several vulnerabilities of Oracle MySQL were announced in April 2015...
Oracle Solaris: several vulnerabilities of April 2015
Several vulnerabilities of Oracle Solaris were announced in April 2015...
Oracle Outside In Technology: two vulnerabilities of April 2015
Several vulnerabilities of Oracle Outside In Technology were announced in April 2015...
Microsoft Windows: credentials disclosure via HTTP redirections
An attacker who controls both an HTTP server used by a application program based on urlmon.dll and a CIFS server can use HTTP redirections to get encrypted user credentials...
Oracle Fusion: several vulnerabilities of April 2015
Several vulnerabilities of Oracle Fusion were announced in April 2015...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Oracle Database: several vulnerabilities of April 2015
Several vulnerabilities of Oracle Database were announced in April 2015...
Oracle Java: several vulnerabilities of April 2015
Several vulnerabilities of Oracle Java were announced in April 2015...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Windows: denial of service via Hyper-V
An attacker can trigger a denial of service in Hyper-V of Windows...
Microsoft .NET: information disclosure via customErrors
An attacker can generate an error in a Microsoft .NET/ASP.NET application, in order to obtain sensitive information...
Windows: information disclosure via AD FS
An attacker can read AD FS data on Windows, in order to obtain sensitive information...
Windows: file reading via MSXML3 DTD
An attacker can create a malicious DTD, to read a file via MSXML3 of Windows, in order to obtain sensitive information...
Windows: two vulnerabilities of Impersonation
An attacker can use several vulnerabilities of Windows...
Windows: privilege escalation via Task Scheduler
A local attacker can use the Task Scheduler of Windows, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 502 503 504 505 506 507 508 509 511 513 514 515 516 517 518 519 520 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103