The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
unzip: two vulnerabilities
An attacker can use several vulnerabilities of unzip...
Joomla Realtyna RPL: vulnerability
A vulnerability of Joomla Realtyna RPL was announced...
WordPress Ultimate Member: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ultimate Member, in order to run JavaScript code in the context of the web site...
WordPress Role Scoper: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Role Scoper, in order to run JavaScript code in the context of the web site...
Xen: nine vulnerabilities
An attacker can use several vulnerabilities of Xen...
nginx: use after free via HTTPv2
An attacker can force the usage of a freed memory area in the HTTPv2 implementation of nginx, in order to trigger a denial of service, and possibly to run code...
Cisco Prime Service Catalog: SQL injection
An attacker can use a SQL injection of Cisco Prime Service Catalog, in order to read or alter data...
Drupal Field as Block: information disclosure
An attacker can bypass access restrictions to data of Drupal Field as Block, in order to obtain sensitive information...
Cisco ASR 5500: denial of service via BGP
A remote and unauthenticated attacker can forge BGP packets for Cisco ASR 5500, in order to trigger a denial of service...
libreport: information disclosure via Bugzilla Bugs
An attacker can bypass access restrictions to data in Bugzilla Bugs of libreport, in order to obtain sensitive information...
Bugzilla: invalid email address creation
During the registration, an attacker can use a long login name, in order to force Bugzilla to create another email address...
audiofile: memory corruption
An attacker can generate a memory corruption of audiofile, in order to trigger a denial of service, and possibly to run code...
IBM Tivoli Monitoring for Tivoli Storage Manager: privilege escalation
A local attacker can modify a file of IBM Tivoli Monitoring for Tivoli Storage Manager, in order to escalate his privileges...
WordPress Form Manager: code execution
An attacker can send a malicious query to WordPress Form Manager, in order to run PHP code...
Joomla Art Pretty Photo: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Art Pretty Photo, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: memory corruption via Datastor
A local attacker can generate a memory corruption in Datastor on F5 BIG-IP, in order to trigger a denial of service, and possibly to run code...
Synology Photo Station: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology Photo Station, in order to run JavaScript code in the context of the web site...
Cisco ASA CX Context-Aware Security: information disclosure via Web GUI
An attacker can use a vulnerability in Cisco ASA CX Context-Aware Security, in order to obtain sensitive information...
Magento CE, EE: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento CE, EE...
HP ArcSight SmartConnector: two vulnerabilities
An attacker can use several vulnerabilities of HP ArcSight SmartConnector...
Kubernetes: directory traversal
An attacker can traverse directories of Kubernetes, in order to read a file outside the service root path...
WildFly: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WildFly, in order to force the victim to perform operations...
apport: privilege escalation
An attacker can bypass restrictions of apport, in order to escalate his privileges...
Linux kernel: memory corruption via skb_copy_and_csum_datagram_iovec
A local attacker can generate a memory corruption in the skb_copy_and_csum_datagram_iovec() function of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Cisco Secure ACS: SQL injection
An attacker can use a SQL injection of Cisco Secure ACS, in order to read or alter data...
WordPress Crony Cronjob Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Crony Cronjob Manager, in order to run JavaScript code in the context of the web site...
Linux kernel: NULL pointer dereference via net/rds/send.c
A local attacker can force a NULL pointer to be dereferenced in net/rds/connection.c of the Linux kernel, in order to trigger a denial of service...
WordPress NextGEN Gallery: file upload
An attacker can upload a malicious file on WordPress NextGEN Gallery, in order for example to upload a Trojan...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 554 555 556 557 558 559 560 561 562 564 566 567 568 569 570 571 572 573 574 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021