The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Landing Pages: code execution
An attacker can use WordPress Landing Pages, in order to run shell code on the server...
TYPO3 MK Forms: file upload
An attacker can upload a malicious file on TYPO3 MK Forms, in order for example to upload a Trojan...
TYPO3 http BL Blocking: SQL injection
An attacker can use a SQL injection of TYPO3 http:BL Blocking, in order to read or alter data...
TYPO3 Quixplorer: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of TYPO3 Quixplorer, in order to force the victim to perform operations...
TYPO3 Zend Framework Integration: file reading
An attacker can read a file of TYPO3 Zend Framework Integration, in order to obtain sensitive information...
TYPO3 Adminer: information disclosure
An attacker can use a vulnerability of TYPO3 Adminer, in order to obtain sensitive information...
TYPO3 News system: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 News system, in order to run JavaScript code in the context of the web site...
TYPO3 LDAP/eu_ldap: information disclosure
An attacker can use a vulnerability of TYPO3 LDAP/eu_ldap, in order to obtain sensitive information...
OTRS: denial of service via otrs.Scheduler.pl
A local attacker can manipulate the PID file of OTRS, in order to trigger a denial of service...
Linux kernel: memory corruption via cifs_ioctl_clone
A local attacker can generate a memory corruption in the cifs_ioctl_clone() function of the Linux kernel, in order to run code with kernel privileges...
Linux kernel: memory disclosure via coredump
A local attacker can read the coredump a privileged processes, in order to obtain sensitive information...
LXC: privilege escalation
An attacker can bypass restrictions of LXC, in order to escalate his privileges...
Centreon: four vulnerabilities
An attacker can use several vulnerabilities of Centreon...
Vtiger CRM: file upload via saveLogo
An authenticated attacker can upload a malicious file on Vtiger CRM, in order for example to upload a Trojan...
NVIDIA: privilege escalation via IOCTL
A local attacker can generate a memory corruption with an IOCTL of NVIDIA, in order to trigger a denial of service, and possibly to run code...
Joomla Vnmshop: vulnerability
A vulnerability of Joomla Vnmshop was announced...
WordPress PopUp: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress PopUp, in order to run JavaScript code in the context of the web site...
WordPress Appointment Booking Calendar: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Appointment Booking Calendar...
Pulse Connect Secure: access to a meeting via Secure Meeting
An attacker can use Secure Meeting of Pulse Connect Secure, in order to obtain sensitive information...
Pulse Connect Secure: information disclosure via Secure Meeting
An attacker can use a vulnerability in Secure Meeting of Pulse Connect Secure, in order to obtain sensitive information...
Perl Email-Address: denial of service via nested comments
An attacker can send emails containing nested email address comments, to a program using the Perl Email::Address module, in order to trigger a denial of service...
rolekit: information disclosure
An attacker can bypass access restrictions to data of rolekit, in order to obtain sensitive information...
Xpra: privilege escalation
An attacker can bypass restrictions of Xpra, in order to escalate his privileges...
HTTPS: Cookie injection
An attacker can inject a cookie in an HTTPS (HTTP+TLS) session, in order to alter the behavior of the web service, if it is not conceived to receive unexpected cookies...
Google Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
FortiManager 5.2.3: two vulnerabilities of GUI
An attacker can use several vulnerabilities of FortiManager GUI v5.2.3...
FortiManager 5.2.2: two vulnerabilities of GUI
An attacker can use several vulnerabilities of FortiManager GUI v5.2.2...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 547 548 549 550 551 552 553 554 555 557 559 560 561 562 563 564 565 566 567 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021