The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Salt: code execution via Minion
An attacker can use a vulnerability in Minion of Salt, in order to run code...
Samba: two vulnerabilities
An attacker can use several vulnerabilities of Samba...
Google Android OS: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Android OS...
SAP: multiples vulnerabilities of March 2016
An attacker can use several vulnerabilities of SAP...
glibc: buffer overflow of glob GLOB_ALTDIRFUNC
A local attacker can generate a buffer overflow in applications using the glob() function with the GLOB_ALTDIRFUNC flag of the glibc, in order to trigger a denial of service, and possibly to run code...
ISC DHCP: denial of service via OMAPI/failover
A remote attacker can open numerous TCP connections to the OMAPI/failover port of ISC DHCP, in order to trigger a denial of service...
PuTTY: buffer overflow of SCP
An attacker, who corrupts a SCP server already known by PuTTY, can generate a buffer overflow in the PSCP client, in order to trigger a denial of service, and possibly to run code...
WordPress Custom Content Type Manager: code execution
An attacker can use WordPress Custom Content Type Manager, in order to run code...
Avast: memory corruption via Authenticode
An attacker can send a PE file with malicious Authenticode data, to generate a memory corruption in Avast, in order to trigger a denial of service, and possibly to run code...
WordPress SP Project and Document Manager: four vulnerabilities
An attacker can use several vulnerabilities of WordPress SP Project and Document Manager...
mote: vulnerability
A vulnerability of mote was announced...
FFmpeg: integer overflow of asf_write_packet
An attacker can generate an integer overflow in asf_write_packet of FFmpeg, in order to trigger a denial of service, and possibly to run code...
BeanShell: code execution via unserialize
An attacker can use a vulnerability in unserialize of BeanShell, in order to run code...
Pigz: directory traversal
An attacker can traverse directories of Pigz, in order to create a file outside the service root path...
QEMU: denial of service via PRNG
An attacker in a guest system can generate an error in the PRNG of QEMU, in order to trigger a denial of service...
exiv2: vulnerability of BanAllEntityUsage
A vulnerability in BanAllEntityUsage of exiv2 was announced...
PHP 5.6: five vulnerabilities
An attacker can use several vulnerabilities of PHP 5.6...
roundup: information disclosure
An attacker can bypass access restrictions to data of roundup, in order to obtain sensitive information...
Cisco Prime Infrastructure: external XML entity injection
An attacker can transmit malicious XML data to Cisco Prime Infrastructure, in order to read a file, scan sites, or trigger a denial of service...
PHP 7: six vulnerabilities
An attacker can use several vulnerabilities of PHP 7...
JasPer: memory leak via JPEG-2000
An attacker can create a memory leak in JPEG-2000 of JasPer, in order to trigger a denial of service...
JasPer: memory corruption via JPEG-2000
An attacker can generate a memory corruption in JPEG-2000 of JasPer, in order to trigger a denial of service, and possibly to run code...
PHP 5.5: two vulnerabilities
An attacker can use several vulnerabilities of PHP 5.5...
pixman: integer overflow
An attacker can generate an integer overflow of pixman, in order to trigger a denial of service, and possibly to run code...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
TYPO3 Apache Solr for TYPO3: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 Apache Solr for TYPO3, in order to run JavaScript code in the context of the web site...
TYPO3 Extension Kickstarter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 Extension Kickstarter, in order to run JavaScript code in the context of the web site...
TYPO3 Fe user statistic: three vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Fe user statistic...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 584 585 586 587 588 589 590 591 592 594 596 597 598 599 600 601 602 603 604 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102