The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Block Class: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Block Class, in order to run JavaScript code in the context of the web site...
Drupal Open Atrium: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Open Atrium, in order to run JavaScript code in the context of the web site...
Drupal Select2 Field Widget: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Select2 Field Widget, in order to run JavaScript code in the context of the web site...
Drupal Values: code execution
An attacker can use Drupal Values, in order to run code...
Linux kernel: information disclosure via sco_sock_bind
A local attacker can read a memory fragment by calling the getsockname() function on a SCO socket on the Linux kernel, in order to obtain sensitive information...
Google Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
LibRaw: denial of service
An attacker can generate a fatal error of LibRaw, in order to trigger a denial of service...
Samba: seven vulnerabilities
An attacker can use several vulnerabilities of Samba...
Wind River VxWorks: integer overflow of RPC
An attacker can generate an integer overflow in the RPC service of Wind River VxWorks, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via aiptek_probe
An attacker can force a NULL pointer to be dereferenced in the aiptek_probe() function of the Linux kernel, in order to trigger a denial of service...
Linux kernel: information disclosure via pptp_bind
A local attacker can read a memory fragment by calling the getsockname() function on a PPTP socket on the Linux kernel, in order to obtain sensitive information...
Apache Subversion: buffer overflow of mod_dav_svn
An authenticated attacker can generate a buffer overflow in the mod_dav_svn module of Apache Subversion, in order to trigger a denial of service, and possibly to run code...
Apache Subversion: integer overflow of svn_error_create
An attacker can generate an integer overflow in the svn_error_create() function of Apache Subversion, in order to trigger a denial of service, and possibly to run code...
ISC BIND: two vulnerabilities
An attacker can use several vulnerabilities of ISC BIND...
Cisco Unified Communications Manager: denial of service of Identity Management
An unauthenticated attacker can generate malicious queries to Cisco Unified Communications Manager, in order to trigger a denial of service...
Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox/Thunderbird...
Joomla Framework Session: code execution via Session Values
An attacker can use malicious Session Values on Joomla Framework Session, in order to run code...
Avast: five vulnerabilities
An attacker can use several vulnerabilities of Avast...
Kaspersky Anti-Virus: directory traversal of Virtual Keyboard GetGraphics
An attacker can traverse directories in Virtual Keyboard of Kaspersky Anti-Virus, in order to read a file outside the service root path...
Joomla com_mydyngallery: SQL injection
An attacker can use a SQL injection of Joomla com_mydyngallery, in order to read or alter data...
WordPress Tierra Billboard Manager: SQL injection
An attacker can use a SQL injection of WordPress Tierra Billboard Manager, in order to read or alter data...
WordPress Admin Management Xtended: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Admin Management Xtended, in order to run JavaScript code in the context of the web site...
Joomla Shape 5 MP3 Player: directory traversal
An attacker can traverse directories of Joomla Shape 5 MP3 Player, in order to read a file outside the service root path...
TYPO3 Core: six vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
Excel: use after free via XLSB
An attacker can invite the victim to open a malicious XLSB file, to force the usage of a freed memory area in Excel, in order to trigger a denial of service, and possibly to run code...
Symantec Endpoint Encryption: information disclosure via Client Memory Dump
A local attacker can force a Memory Dump of Symantec Endpoint Encryption, in order to obtain sensitive information, to access to SEE Management Server...
Node.js mustache: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js mustache, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco IOS XE: denial of service via IPv6 Neighbor Discovery
An attacker can send numerous IPv6 Neighbor Discovery packets to Cisco IOS XE, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 565 566 567 568 569 570 571 572 573 575 577 578 579 580 581 582 583 584 585 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022