The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SeqAn: vulnerability
A vulnerability of SeqAn was announced...
Cisco ESA, WSA, AsyncOS: six vulnerabilities
An attacker can use several vulnerabilities of Cisco ESA, WSA, AsyncOS...
wpa_supplicant: vulnerability
A vulnerability of wpa_supplicant was announced...
util-linux: buffer overflow of colcrt
An attacker can generate a buffer overflow in colcrt of util-linux, in order to trigger a denial of service, and possibly to run code...
potrace: integer overflow of BMP
An attacker can generate an integer overflow in BMP of potrace, in order to trigger a denial of service, and possibly to run code...
roundcubemail: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of roundcubemail, in order to run JavaScript code in the context of the web site...
Node.js tar: directory traversal via symlink
An attacker can create a malicious tar archive, to traverse directories in Node.js tar, in order to create a file outside the service root path...
MIT krb5: three vulnerabilities
An attacker can use several vulnerabilities of MIT krb5...
HP ArcSight: privilege escalation
A local attacker can alter files of HP ArcSight, in order to escalate his privileges...
XScreenSaver: privilege escalation via Unplugging Monitor
An attacker can bypass restrictions by unplugging a monitor of XScreenSaver, in order to escalate his privileges...
Horde: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Horde, in order to force the victim to perform operations...
Mozilla NSS/NSPR: three vulnerabilities
An attacker can use several vulnerabilities of Mozilla NSS/NSPR...
Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
libsndfile: division by zero via psf_fwrite
An attacker can generate an arithmetic error in the psf_fwrite() function of libsndfile, in order to trigger a denial of service...
libsndfile: unreachable memory reading via psf_strlcpy_crlf
An attacker can force a read at an invalid address in psf_strlcpy_crlf() of libsndfile, in order to trigger a denial of service...
libsndfile: buffer overflow of AIFF
An attacker can generate a buffer overflow with an AIFF file opened by libsndfile, in order to trigger a denial of service, and possibly to run code...
WebSphere AS 7.0: four vulnerabilities
An attacker can use several vulnerabilities of WebSphere AS 7.0...
Google Android OS: multiple vulnerabilities of November 2015
An attacker can use several vulnerabilities of Google Android OS...
znc: denial of service
An attacker can generate a fatal error of znc, in order to trigger a denial of service...
Node.js send: directory traversal
An attacker can traverse directories of Node.js send, in order to read a file outside the service root path...
Joomla com_ebcontent: SQL injection
An attacker can use a SQL injection of Joomla com_ebcontent, in order to read or alter data...
Joomla cckjseblod: directory traversal
An attacker can traverse directories of Joomla cckjseblod, in order to read a file outside the service root path...
libxml2: denial of service via xz
An attacker can create a malformed compressed XML file, in order to generate a denial of service in applications linked to libxml2 with the support of xz enabled...
SPIP: two vulnerabilities
An attacker can use several vulnerabilities of SPIP...
mod_nss: vulnerability
A vulnerability of mod_nss was announced...
OpenAFS: two vulnerabilities
An attacker can use several vulnerabilities of OpenAFS...
WebSphere AS: HTTP Response Splitting
An attacker can use an HTTP Response Splitting, in order to alter HTTP replies of WebSphere AS, so he can obtain information for example...
Joomla JNews: SQL injection
An attacker can use a SQL injection of Joomla JNews, in order to read or alter data...
Joomla Real Estate Manager: SQL injection
An attacker can use a SQL injection of Joomla Real Estate Manager, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 555 556 557 558 559 560 561 562 563 565 567 568 569 570 571 572 573 574 575 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050