The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Users Ultra Membership Plugin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Users Ultra Membership Plugin, in order to run JavaScript code in the context of the web site...
WordPress Users Ultra Membership Plugin: SQL injection
An attacker can use a SQL injection of WordPress Users Ultra Membership Plugin, in order to read or alter data...
Red Hat JBoss EAP: denial of service
An authenticated attacker with a specific role can stop Red Hat JBoss EAP, in order to trigger a denial of service...
KeePass: privilege escalation
An attacker can bypass restrictions of KeePass, in order to escalate his privileges...
Drupal Token Insert Entity: information disclosure
An attacker can insert a token with Drupal Token Insert Entity, in order to obtain sensitive information...
Drupal Apache Solr Search: denial of service
An attacker can delete the search environment of Drupal Apache Solr Search, in order to trigger a denial of service...
Drupal Chat Room: information disclosure via websocket
An attacker can use the websocket of Drupal Chat Room, in order to obtain sensitive information...
Drupal Mollom: bypassing blacklist
An attacker can bypass blacklists of Drupal Mollom, in order to publish forbidden contents...
Drupal Core: code execution via install.php
An attacker can call the install.php page on an non-terminated installation of Drupal Core, in order to run code...
cups-filters: code execution via foomatic-rip via back ticks
An attacker can use the back ticks character in foomatic-rip of cups-filters, in order to run code...
Drupal RESTful: code execution
An attacker can use a missing input validation of some classes related to Drupal RESTful, in order to run code...
ArubaOS: three vulnerabilities
An attacker can use several vulnerabilities of ArubaOS...
dhcpcd: denial of service via decode_search
An attacker can generate a fatal error in decode_search of dhcpcd, in order to trigger a denial of service...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
PCRE: multiple vulnerabilities
An attacker can use several vulnerabilities of PCRE...
Cisco Cloud Services Router 1000V: privilege escalation via Environment Variables
A privileged attacker can use environment variables on Cisco Cloud Services Router 1000V, in order to escalate his privileges to root...
dracut: file corruption via Hardcoded Filenames
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of dracut...
znc: denial of service via Channel Creation
An attacker can generate a fatal error in Channel Creation of znc, in order to trigger a denial of service...
Dell: secret key of certificates published
An attacker can spoof the identity of any web site, on Dell computers...
GnuTLS: variant of POODLE
An attacker, located as a Man-in-the-Middle, can decrypt a SSL session of an application compiled with GnuTLS, in order to obtain sensitive information...
FAQ OTRS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of FAQ OTRS, in order to run JavaScript code in the context of the web site...
Cisco IOS-XE 3S: privilege escalation
An authenticated attacker can inject a command on Cisco IOS-XE 3S, in order to escalate his privileges...
Cisco Web Security Appliance: infinite loop of FTP Proxy
An attacker can generate an infinite loop in the FTP Proxy of Cisco Web Security Appliance, in order to trigger a denial of service...
Brocade FabricOS: multiple vulnerabilities
A local attacker can use several vulnerabilities of Brocade FabricOS, in order to obtain sensitive information or to escalate his privileges...
imapsync: vulnerability
A vulnerability of imapsync was announced...
Perl HTML-Scrubber: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Perl HTML::Scrubber, in order to run JavaScript code in the context of the web site...
Joomla K2: read-write access
A local attacker can bypass access restrictions of Joomla K2, in order to read or alter data...
Joomla Resize Image On The Fly and Cache: vulnerability
A vulnerability of Joomla Resize Image On The Fly and Cache was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 562 563 564 565 566 567 568 569 571 573 574 575 576 577 578 579 580 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1011