The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
TYPO3 Smoelenboek: SQL injection
An attacker can use a SQL injection of TYPO3 Smoelenboek, in order to read or alter data...
TYPO3 Store Locator: SQL injection
An attacker can use a SQL injection of TYPO3 Store Locator, in order to read or alter data...
TYPO3 wt_directory: SQL injection
An attacker can use a SQL injection of TYPO3 wt_directory, in order to read or alter data...
TYPO3 BE User Log: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 BE User Log, in order to execute JavaScript code in the context of the web site...
OpenBSD: denial of service via sys_execve
An attacker can generate a fatal error in sys_execve() of OpenBSD, in order to trigger a denial of service...
TYPO3 feupload: code execution
An attacker can inject a bad file of TYPO3 feupload, in order to execute code...
TYPO3 Akronymmanager: SQL injection
An attacker can use a SQL injection of TYPO3 Akronymmanager, in order to read or alter data...
Cisco IOS: privilege escalation via TCL
An attacker can attach himself to the pseudo-terminal of a terminating TCL script in of Cisco IOS, in order to get administrator privileges...
Cisco Email Security Appliance: filtering bypass via SPF
An attacker can send a specially crafted DNS SPF response to Cisco Email Security Appliance, in order to bypass the filtering rules for SMTP...
WordPress SEO by Yoast: Cross Site Scripting of post-new.php
An attacker can trigger a Cross Site Scripting in post-new.php of WordPress SEO by Yoast, in order to execute JavaScript code in the context of the web site...
WordPress zip-attachments: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress zip-attachments, in order to read a file outside the service root path...
coreutils: vulnerability
An unknown vulnerability of one of the tools from the FSF package coreutils was announced...
Check Point Security Gateway: memory leak via CIFS
An attacker can create a memory leak in the CIFS protocol analyser of Check Point Security Gateway, in order to trigger a denial of service...
FileZilla Client: denial of service
An attacker can generate a fatal error of FileZilla Client by closing a connection from the server side when the client is about to open a new one, in order to trigger a denial of service...
armacycles-ad: 3 vulnerabilities
An attacker can exploit 3 vulnerabilities of armacycles-ad, related to the processing of network flows, in order to for instance trigger a denial of service...
WordPress Paypal Currency Converter Basic For Woocommerce: directory traversal
An attacker can traverse directories of WordPress Paypal Currency Converter Basic For Woocommerce, in order to read a file outside the service root path...
Joomla EQ Event Calendar: SQL injection
An attacker can use a SQL injection of Joomla EQ Event Calendar, in order to read or alter data...
WordPress History Collection: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress History Collection, in order to read a file outside the service root path...
Linux kernel: memory corruption via vhost/scsi.c
An attacker can generate a memory corruption in vhost/scsi.c in the Linux kernel, in order to trigger a denial of service...
tidy: buffer overflow
An attacker can generate a buffer overflow of tidy, in order to trigger a denial of service, and possibly to execute code...
Xen: unreachable memory reading via iret
An attacker who controls the guest kernel can use a "return from interrupt handler" under Xen, in order to trigger a denial of service...
OpenSSL: use after free via DTLS
An attacker can force the usage of a freed memory area via DTLS in OpenSSL, in order to trigger a denial of service, and possibly to execute code...
OpenSSL: four vulnerabilities
An attacker can use several vulnerabilities of OpenSSL...
Xen: NULL pointer dereference via the permission table
An attacker can force a NULL pointer to be dereferenced in Xen by using a wrong permission table, in order to trigger a denial of service...
Cisco IOS XR: denial of service via IPv6
An attacker can send a malicious IPv6 packet to Cisco IOS XR, in order to trigger a denial of service...
Cacti: three vulnerabilities
An attacker can use several vulnerabilities of Cacti...
PHP: five vulnerabilities
An attacker can use several vulnerabilities of PHP...
Red Hat Ceph Deploy: two vulnerabilities
An attacker can use several vulnerabilities of Red Hat Ceph Deploy...
OSSEC: privilege escalation via syscheck
An attacker can make syscheck of OSSEC run shell commands, in order to get administration privileges...
Cisco IOS XR: denial of service via telnetd
An attacker can send a malicious telnetd packet to Cisco IOS XR, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 518 519 520 521 522 523 524 525 526 528 530 531 532 533 534 535 536 537 538 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1035