The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cacti: SQL injection of graph.php rra_id
An attacker can use a SQL injection via the rra_id parameter of Cacti, in order to read or alter data...
pax-utils: security improvement
The security of pax-utils was improved...
Cisco Prime Collaboration Assurance: default SSH account
A remote attacker can use a default account of Cisco Prime Collaboration Assurance, in order to authenticate via SSH on the system...
Google Chrome: five vulnerabilities
An attacker can use several vulnerabilities of Chrome...
WordPress Content text slider on post: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Content text slider on post, in order to run JavaScript code in the context of the web site...
WordPress Polls Widget: SQL injection
An attacker can use a SQL injection of WordPress Polls Widget, in order to read or alter data...
Puppet Enterprise: disclosure of JSESSIONID Cookies
An attacker can force a Puppet Enterprise client to connect to a fake server not TLS, to obtain his session cookie, in order to connect to the server and to obtain sensitive information...
VirusScan Enterprise: bypassing BOP
An attacker can use the BOP feature of VirusScan Enterprise, in order to ease the development of an exploit for a vulnerability in a software protected by BOP...
ImageMagick: three vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
Potrace: memory corruption via BMP
An attacker can generate a memory corruption in BMP of Potrace, in order to trigger a denial of service, and possibly to run code...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Windows: four vulnerabilities of Kernel
An attacker can use several vulnerabilities of Kernel of Windows...
Windows: two vulnerabilities of Media Center
An attacker can use several vulnerabilities of Media Center of Windows...
Windows: privilege escalation via PGM
An attacker can force the usage of a freed memory area via PGM on Windows, in order to trigger a denial of service, and possibly to run code...
Windows: three vulnerabilities of Library Loading
An attacker can use several vulnerabilities of Library Loading of Windows...
Microsoft Office: six vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
Windows: integer overflow of Uniscribe
An attacker can invite the victim to open a document containing a malicious font, to generate an integer overflow in the Uniscribe implementation of Windows, in order to trigger a denial of service, and possibly to run code...
Silverlight: three vulnerabilities
An attacker can use several vulnerabilities of Silverlight...
Windows, .NET, Office, Skype, Lync, Silverlight: three vulnerabilities of Graphics Component
Several vulnerabilities were announced in Windows, .NET, Office, Skype, Lync and Silverlight...
Windows: use after free via DNS
An attacker can force the usage of a freed memory area in the DNS service of Windows, in order to trigger a denial of service, and possibly to run code...
Windows: two vulnerabilities of Scripting Engine
An attacker can use several vulnerabilities of Scripting Engine of Windows...
Microsoft Edge: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Edge...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
git: code execution via Url
An attacker can use a vulnerability in Url of git, in order to run code...
Cisco Prime Service Catalog: privilege escalation via Configuration Change
An attacker can edit the configuration of Cisco Prime Service Catalog, in order to escalate his privileges...
Synology Photo Station: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology Photo Station, in order to run JavaScript code in the context of the web site...
Xen: denial of service via libxl PV bootloader
An attacker can request, to the same process linked to libxl, several domains with a PV bootloader to be started, in order to trigger a denial of service...
Xen: denial of service via XENMEM_exchange
An attacker, who is administrator in a guest system, can use the XENMEM_exchange hypercall on Xen, in order to trigger a denial of service on the host system...
Xen: denial of service via ARM HYPERVISOR_memory_op
An attacker, who is administrator in a guest system, can use hypercalls of HYPERVISOR_memory_op on Xen, in order to trigger a denial of service on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 563 564 565 566 567 568 569 570 571 573 575 576 577 578 579 580 581 582 583 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022