The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
JBoss Enterprise Application Platform: privilege escalation via RBAC
An attacker can bypass restrictions via RBAC of JBoss Enterprise Application Platform, in order to escalate his privileges...
Undertow: HTTP header injection
An attacker can inject HTTP headers in Undertow, in order to read or alter data...
Inspircd: privilege escalation via SASL
An attacker can bypass restrictions via SASL of Inspircd, in order to escalate his privileges...
Cisco ACE 4710, ACE30: denial of service via SSL/TLS
An attacker can send a malicious SSL/TLS packet to Cisco ACE 4710, ACE30, in order to trigger a denial of service...
Asterisk: two vulnerabilities
An attacker can use several vulnerabilities of Asterisk...
WordPress Members Import: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Members Import, in order to force the victim to perform operations...
WordPress cubed: file upload
An attacker can upload a malicious file on WordPress cubed, in order for example to upload a Trojan...
Xen: use after free via FIFO
An attacker, inside a guest system, can force the usage of a freed memory area via FIFO of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
Xen: denial of service via HVM sh_ctxt->seg_reg
An attacker, who is privileged in a guest system, can generate a fatal error via HVM sh_ctxt->seg_reg of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via Instruction Pointer Truncation
An attacker, who is privileged in a guest system, can bypass restrictions via Instruction Pointer Truncation of Xen, in order to escalate his privileges on the host system...
Xen: privilege escalation via L3 Recursive Pagetable
An attacker, who is privileged in a guest system, can bypass restrictions via L3 Recursive Pagetable of Xen, in order to escalate his privileges on the host system...
libstorage: information disclosure via Password Files
An attacker can bypass access restrictions to data via Password Files of libstorage, in order to obtain sensitive information...
ICU: buffer overflow via uloc_acceptLanguageFromHTTP
An attacker can generate a buffer overflow via uloc_acceptLanguageFromHTTP of ICU, in order to trigger a denial of service, and possibly to run code...
Wireshark: six vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
WordPress Core: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
RoundCube: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of RoundCube, in order to run JavaScript code in the context of the web site...
RoundCube: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of RoundCube, in order to force the victim to perform operations...
JBoss RESTEasy: two vulnerabilities
An attacker can use several vulnerabilities of JBoss RESTEasy...
TYPO3 Speaking URLs: denial of service
An attacker can generate a fatal error of TYPO3 Speaking URLs, in order to trigger a denial of service...
Castle Rock SNMPc: Cross Site Scripting via SNMP
An attacker can trigger a Cross Site Scripting of Castle Rock SNMPc, in order to run JavaScript code in the context of the web site...
Drupal Flag Lists: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Flag Lists, in order to run JavaScript code in the context of the web site...
WordPress 404-to-301: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress 404-to-301, in order to run JavaScript code in the context of the web site...
Android OS: two vulnerabilities via Qualcomm
An attacker can use several vulnerabilities via Qualcomm of Android OS...
Android OS: multiple vulnerabilities 2016-09-05
An attacker can use several vulnerabilities of Android OS...
Android OS: multiple vulnerabilities 2016-09-01
An attacker can use several vulnerabilities of Android OS...
389 Directory Server: information disclosure via LDAP Sub-tree
An attacker can bypass access restrictions to data via LDAP Sub-tree of 389 Directory Server, in order to obtain sensitive information...
MediaWiki: multiple vulnerabilities
An attacker can use several vulnerabilities of MediaWiki...
Charybdis: privilege escalation
An attacker can bypass restrictions of Charybdis, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 632 633 634 635 636 637 638 639 640 642 644 645 646 647 648 649 650 651 652 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013