The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: unreachable memory reading via address_space_translate
An attacker, who is privileged in a guest system, can force a read at an invalid address in address_space_translate() of QEMU, in order to trigger a denial of service...
Joomla Vnmshop: vulnerability
A vulnerability of Joomla Vnmshop was announced...
Joomla JSN Power Admin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla JSN Power Admin, in order to run JavaScript code in the context of the web site...
WordPress More Fields: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress More Fields, in order to force the victim to perform operations...
Apache Struts: code execution via TextParseUtil/ActionSupport
An attacker can use a vulnerability in TextParseUtil.translateVariables of Apache Struts, in order to run code...
WordPress Gravity Forms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gravity Forms, in order to run JavaScript code in the context of the web site...
Microsoft PowerPoint Viewer: code execution via api-ms-win-appmodel-runtime-l1-1-0.dll
An attacker can invite the victim to open a PowerPoint file in the same directory than a api-ms-win-appmodel-runtime-l1-1-0.dll file, in order to run code...
phpMyAdmin: four vulnerabilities
An attacker can use several vulnerabilities of phpMyAdmin...
OkHttp: Man-in-the-Middle of Certificate Pining
An attacker can act as a Man-in-the-Middle of Certificate Pining on OkHttp, in order to read or write data in the session...
Joomla Spider Random Article: vulnerability
A vulnerability of Joomla Spider Random Article was announced...
Joomla Form Maker: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Form Maker, in order to run JavaScript code in the context of the web site...
Joomla Breezing Forms: information disclosure
An attacker can bypass access restrictions to data of Joomla Breezing Forms, in order to obtain sensitive information...
WordPress Good News Themes: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Good News Themes, in order to run JavaScript code in the context of the web site...
xymon: five vulnerabilities
An attacker can use several vulnerabilities of xymon...
Wireshark 1: seven vulnerabilities
An attacker can use several vulnerabilities of Wireshark 1...
Wireshark 2: eighteen vulnerabilities
An attacker can use several vulnerabilities of Wireshark 2...
RabbitMQ: two vulnerabilities
An attacker can use several vulnerabilities of RabbitMQ...
OpenStack Glance: image status manipulation
An attacker can use a "location" of OpenStack Glance, in order to alter the status of an image...
Python Pillow: buffer overflow of PcdDecode.c
An attacker can generate a buffer overflow in PcdDecode.c of Python Pillow, in order to trigger a denial of service, and possibly to run code...
Linux kernel: denial of service via Visor treo_attach
An attacker can plug a malicious USB device, in order to trigger a denial of service in the visor driver of the Linux kernel...
WordPress Ocim MP3: SQL injection
An attacker can use a SQL injection of WordPress Ocim MP3, in order to read or alter data...
Pulse Secure Connect Secure: privilege escalation via RDP
An attacker can use RDP of Pulse Secure Connect Secure, in order to escalate his privileges...
McAfee VirusScan Enterprise: bypassing of self-protection
A local attacker can bypass the self-protection of McAfee VirusScan Enterprise, in order to elevate his privileges...
WordPress WP Ultimate Exporter: SQL injection
An attacker can use a SQL injection of WordPress WP Ultimate Exporter, in order to read or alter data...
Apache Xerces-C: buffer overflow
An attacker can generate a buffer overflow of Apache Xerces-C, in order to trigger a denial of service, and possibly to run code...
Linux kernel: integer overflow of aio_setup_single_vector
An attacker can generate an integer overflow in the aio_setup_single_vector() function of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Drupal FileField: denial of service
An attacker can use Drupal FileField, in order to trigger a denial of service...
PAN-OS: four vulnerabilities
An attacker can use several vulnerabilities of PAN-OS...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 582 583 584 585 586 587 588 589 590 592 594 595 596 597 598 599 600 601 602 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103