The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla Access manager: vulnerability
A vulnerability of Joomla Access manager was announced...
WordPress Auto ThickBox Plus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Auto ThickBox Plus, in order to run JavaScript code in the context of the web site...
QEMU: buffer overflow of AMD PC-Net II Non-Loopback Mode
A remote attacker can generate a buffer overflow in AMD PC-Net II in Non-Loopback mode of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
QEMU: buffer overflow of AMD PC-Net II Loopback Mode
A privileged attacker in a guest system can generate a buffer overflow in AMD PC-Net II in Loopback mode of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
Siemens SIMATIC: code execution via Communication Processor
An unauthenticated attacker can access to the port 102/tcp of Siemens SIMATIC Communication Processor, in order to execute privileged commands...
ProFTPD: denial of service via SFTP
An attacker can force the SFTP module of ProFTPD to allocate large amount of resources, in order to trigger a denial of service...
ProFTPD: unreachable memory reading via Zero Length Malloc
An attacker can force a read at an invalid address with a zero length malloc() by ProFTPD, in order to trigger a denial of service...
WordPress Cool Video Gallery: command injection
An attacker can send malicious data when a video is uploaded on WordPress Cool Video Gallery, in order to run code...
Cyrus IMAP: two vulnerabilities
An attacker can use several vulnerabilities of Cyrus IMAP...
FFmpeg: four vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
Linux kernel: information disclosure via Btrfs Compressed Extent
A local attacker can use a vulnerability in the implementation of Btrfs Compressed Extent of the Linux kernel, in order to obtain sensitive information...
Linux kernel: unreachable memory reading via x509_decode_time
An attacker can force a read at an invalid address in the x509_decode_time() function of the Linux kernel, in order to trigger a denial of service...
WordPress Double Opt-In for Download: SQL injection
An attacker can use a SQL injection of WordPress Double Opt-In for Download, in order to read or alter data...
PCRE: buffer overflow of match
An attacker can generate a buffer overflow in match of PCRE, in order to trigger a denial of service, and possibly to run code...
PCRE: buffer overflow of pcre_exec
An attacker can generate a buffer overflow in pcre_exec of PCRE, in order to trigger a denial of service, and possibly to run code...
dpkg: two vulnerabilities
An attacker can use several vulnerabilities of dpkg...
V8: unreachable memory reading
An attacker can force a read at an invalid address of V8, in order to trigger a denial of service...
Node.js: denial of service via HTTP Pipelining
An attacker can use HTTP Pipelining to generate a fatal error of Node.js, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via Telnet
An attacker can send a malicious Telnet packet to Cisco ASR 5000, in order to trigger a denial of service...
Mozilla NSS: update of the certification authority list
The security of Mozilla NSS was improved with an updated list of CA certificates...
smokeping: code execution via mod_cgi
An attacker can use a vulnerability in mod_cgi of smokeping, in order to run code...
HP Loadrunner/Performance Virtual Table Server: code execution via import_database
An unauthenticated attacker can access to HP Loadrunner Virtual Table Server or HP Performance Center Virtual Table Server, in order to run privileged code...
QEMU: infinite loop of i8255x/PRO100
An attacker can generate an infinite loop in the i8255x/PRO100 emulation by QEMU, in order to trigger a denial of service...
Django: information disclosure via Date Template Filter
An attacker can bypass access restrictions to data in Date Template Filter of Django, in order to obtain sensitive information...
Cisco ASA: denial of service via XML Parser
An attacker can send malicious XML data to the Cisco ASA Management Interface, in order to trigger a denial of service...
Xen: privilege escalation via Virtual PMU
An attacker located in a guest system can use Virtual PMU of Xen, in order to escalate his privileges on the host system...
IBM Tivoli Storage Manager for VE: code execution
An attacker can use a vulnerability of IBM Tivoli Storage Manager for VE, in order to run code...
Zend Framework: two vulnerabilities
An attacker can use several vulnerabilities of Zend Framework...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 560 561 562 563 564 565 566 567 568 570 572 573 574 575 576 577 578 579 580 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103