The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Events Made Easy: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Events Made Easy, in order to run JavaScript code in the context of the web site...
Avast: file moved/deleted via ZIP
An attacker can send a malicious ZIP file to Avast, in order to force a file to be moved/deleted...
WordPress Video Gallery: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Video Gallery, in order to force the victim to perform operations...
LibreSSL: two vulnerabilities
An attacker can use several vulnerabilities of LibreSSL...
Spring Framework: code execution via Reflected File Download
An attacker can trigger a Reflected File Download with Spring Framework, in order to invite the victim to run malicious code...
F5 BIG-IP: denial of service via vCMP
An attacker can send a malicious packet to F5 BIG-IP vCMP, in order to trigger a denial of service...
OpenStack Networking/Neutron: privilege escalation via AMQP API
An attacker can bypass restrictions in AMQP API of OpenStack Networking/Neutron, in order to escalate his privileges...
OpenStack Compute/Nova: denial of service via Resize State
An attacker can generate a fatal error in Resize State of OpenStack Compute/Nova, in order to trigger a denial of service...
OpenStack Glance: denial of service via Image
An attacker can generate a fatal error in Image of OpenStack Glance, in order to trigger a denial of service...
OpenStack Glance: vulnerability of x-image-meta-status
A vulnerability in x-image-meta-status of OpenStack Glance was announced...
OpenStack Swift: information disclosure
An attacker can bypass access restrictions to data of OpenStack Swift, in order to obtain sensitive information...
Click: privilege escalation
An attacker can bypass restrictions of Click, in order to escalate his privileges...
Firefox: information disclosure via fetch
An attacker can use the fetch() function in a web site, in order to obtain sensitive information belonging to another site...
Red Hat JBoss Enterprise Application Platform: three vulnerabilities
An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform...
WordPress WP-Piwik: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP-Piwik, in order to run JavaScript code in the context of the web site...
OpenBSD: denial of service via kevent
A local attacker can block kevents on OpenBSD, in order to trigger a denial of service...
RHEL: disabling securelevel with UEFI Secure Boot
After some operations with UEFI Secure Boot, a local attacker can thus use kexec_load to load an unsigned kernel...
Wireshark: memory corruption via Interface Filter
An attacker can generate a memory corruption in Wireshark, in order to trigger a denial of service, and possibly to run code...
Adobe Flash Player: three vulnerabilities
An attacker can invite the victim to visit a malicious site, calling Adobe Flash Player, in order to run code...
Juniper Junos: infinite loop of SSH
An unauthenticated attacker can generate an infinite loop in SSH of Juniper Junos, in order to trigger a denial of service...
Juniper Junos: privilege escalation via pam.conf
A local attacker can wait for the corruption of the pam.conf file of Juniper Junos, in order to escalate his privileges...
Juniper Junos: port opening via FTPS
An attacker can make malicious packets traverse SRX with the FTPS protocol...
ScreenOS: denial of service via L2TP
An attacker can send a malicious L2TP packet to ScreenOS, in order to trigger a denial of service...
Juniper Junos: denial of service via vSRX
An attacker can send a malicious query to vSRX with Juniper Junos, in order to trigger a denial of service...
Juniper Junos: denial of service via uBFD
An attacker can send a malicious uBFD packet to Juniper Junos, in order to trigger a denial of service...
Drupal Twilio: privilege escalation
An attacker can perform reserved operations via the Drupal Twilio module, in order to escalate his privileges...
Juniper Junos: denial of service via SRX5000 J-Web
An attacker can send a malicious query to J-Web of Juniper Junos on SRX5000, in order to trigger a denial of service...
Juniper Junos: denial of service via IPv6
An attacker can send malicious IPv6 packets to Juniper Junos, in order to trigger a denial of service...
OpenNMS: external XML entity injection
An attacker can transmit malicious XML data to OpenNMS, in order to read a file, scan sites, or trigger a denial of service...
Juniper Junos Space: three vulnerabilities
An attacker can use several vulnerabilities of Juniper Junos Space...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 551 552 553 554 555 556 557 558 559 561 563 564 565 566 567 568 569 570 571 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070