The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress CM Ad Changer: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress CM Ad Changer, in order to run JavaScript code in the context of the web site...
WordPress Unlimited Pop-Ups: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Unlimited Pop-Ups, in order to run JavaScript code in the context of the web site...
libgd2: integer overflow
An attacker can generate an integer overflow of libgd2, in order to trigger a denial of service, and possibly to run code...
imlib2: integer overflow
An attacker can generate an integer overflow of imlib2, in order to trigger a denial of service, and possibly to run code...
imlib2: out-of-bounds memory reading via Coordinates
An attacker can force a read at an invalid address in Coordinates of imlib2, in order to trigger a denial of service, or to obtain sensitive information...
imlib2: integer overflow
An attacker can generate an integer overflow of imlib2, in order to trigger a denial of service, and possibly to run code...
WordPress Tweet Wheel: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Tweet Wheel, in order to run JavaScript code in the context of the web site...
WordPress Google SEO Pressor Snippets: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Google SEO Pressor Snippets, in order to run JavaScript code in the context of the web site...
WordPress Echosign: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Echosign, in order to run JavaScript code in the context of the web site...
Bozohttpd: code execution via CGI Handlers
An attacker can use CGI handlers of Bozohttpd, which were not conceived to be called as a CGI, in order to run code on NetBSD...
NetBSD: three vulnerabilities of Compatibility Layers
An attacker can use several vulnerabilities of Compatibility Layers of NetBSD...
libtasn1: infinite loop of DER Certificates
An attacker can generate an infinite loop in DER Certificates of libtasn1, in order to trigger a denial of service...
GLPI: SQL injection of ajax/getDropdownConnect.php
An attacker can use a SQL injection in ajax/getDropdownConnect.php of GLPI, in order to read or alter data...
WordPress iThemes Security: two vulnerabilities
An attacker can use several vulnerabilities of WordPress iThemes Security...
Apache Struts: two vulnerabilities
An attacker can use several vulnerabilities of Apache Struts...
BIOS: privilege escalation via SMM
A local privileged attacker can use SMM on some BIOS, in order to bypass Secure Boot or to flash the firmware...
Drupal Organic groups: privilege escalation
An attacker can bypass restrictions of Drupal Organic groups, in order to escalate his privileges...
Drupal EPSA Crop: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal EPSA Crop, in order to run JavaScript code in the context of the web site...
Drupal Search API: three vulnerabilities
An attacker can use several vulnerabilities of Drupal Search API...
Avast: escape from Sandbox
An attacker can use an IOCTL of Avast, in order to create a file from an application protected by the sandbox...
Cisco Wireless LAN Controller: denial of service via HTTP
An attacker can send a malicious HTTP packet to Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Wireless LAN Controller: code execution via HTTP
An attacker can send a malicious HTTP packet to Cisco Wireless LAN Controller, in order to run code...
Cisco Wireless LAN Controller: denial of service via Bonjour
An attacker can send a malicious Bonjour packet to Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco ASA 9.4.1: denial of service via DHCPv6
An attacker can send a malicious DHCPv6 packet to Cisco ASA, in order to trigger a denial of service...
GIFLIB: buffer overflow of gif2rgb
An attacker can generate a buffer overflow in gif2rgb of GIFLIB, in order to trigger a denial of service, and possibly to run code...
Squid: two vulnerabilities
An attacker can use several vulnerabilities of Squid...
Node.js express-restify-mongoose: information disclosure
An attacker can bypass access restrictions to data of Node.js express-restify-mongoose, in order to obtain sensitive information...
Perl: infinite loop of UTF-8 Continuation
An attacker can send malformed UTF-8 data to a Perl application, to generate an infinite loop, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 595 596 597 598 599 600 601 602 603 605 607 608 609 610 611 612 613 614 615 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103