The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: out-of-bounds memory reading via sctp_sf_ootb
An attacker can force a read at an invalid address via sctp_sf_ootb on the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
Xen: information disclosure via Pygrub Delimiter Injection
An attacker can bypass access restrictions to data via Pygrub Delimiter Injection of Xen, in order to obtain sensitive information...
Xen: privilege escalation via Shared Ring
An attacker can bypass restrictions via Shared Ring of Xen, in order to escalate his privileges...
Xen: denial of service via X86 Software Interrupt
An attacker, inside a guest system, can generate a fatal error via X86 Software Interrupt of Xen, in order to trigger a denial of service on the host system...
Xen: privilege escalation via X86 64-bit Bit Test Instruction
An attacker, inside a guest system, can bypass restrictions via X86 64-bit Bit Test Instruction of Xen, in order to escalate his privileges on the host system...
Xen: information disclosure via 32-bit ELF Symbol Table
An attacker, inside a guest system, can bypass access restrictions to data via 32-bit ELF Symbol Table of Xen, in order to obtain sensitive information on the host system...
Xen: denial of service via X86 Segment Base Write
An attacker can generate a fatal error via X86 Segment Base Write of Xen, in order to trigger a denial of service...
Xen: privilege escalation via X86 Task Switch
An attacker can bypass restrictions via X86 Task Switch of Xen, in order to escalate his privileges...
Xen: privilege escalation via X86 Null Segments
An attacker can bypass restrictions via X86 Null Segments of Xen, in order to escalate his privileges...
WordPress Wp-D3: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Wp-D3, in order to force the victim to perform operations...
WordPress Olimometer: SQL injection
An attacker can use a SQL injection of WordPress Olimometer, in order to read or alter data...
WordPress MailChimp: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress MailChimp, in order to force the victim to perform operations...
TYPO3 Core: two vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
Apache Tomcat: code execution via JmxRemoteLifecycleListener Deserialization
An attacker can use a vulnerability via JmxRemoteLifecycleListener Deserialization of Apache Tomcat, in order to run code...
Apache Tomcat: infinite loop via HTTP/2
An attacker can generate an infinite loop via HTTP/2 of Apache Tomcat, in order to trigger a denial of service...
Apache Tomcat: information disclosure via HTTP Request Line
An attacker can bypass access restrictions to data via HTTP Request Line of Apache Tomcat, in order to obtain sensitive information...
FreeBSD: information disclosure via kmq_setattr
A local attacker can read a memory fragment via kmq_setattr of FreeBSD, in order to obtain sensitive information...
SIMATIC CP/S7: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC CP/S7...
NTP.org: multiple vulnerabilities
An attacker can use several vulnerabilities of NTP.org...
ipsilon: information disclosure
An attacker can bypass access restrictions to data of ipsilon, in order to obtain sensitive information...
Cisco Nexus 9000 Series Leaf Switches for ACI: denial of service
An attacker can send malicious packets to Cisco Nexus 9000 Series Leaf Switches for ACI, in order to trigger a denial of service...
Python Cryptography: information disclosure
An attacker can bypass access restrictions to data of Python Cryptography, in order to obtain sensitive information...
sniffit: buffer overflow
An attacker can generate a buffer overflow of sniffit, in order to trigger a denial of service, and possibly to run code...
Joomla K2: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Joomla K2, in order to force the victim to perform operations...
WordPress Relevanssi Premium: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Relevanssi Premium...
LibTIFF: NULL pointer dereference via TIFFFetchNormalTag
An attacker can force a NULL pointer to be dereferenced via TIFFFetchNormalTag of LibTIFF, in order to trigger a denial of service...
WordPress Check Email: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Check Email, in order to run JavaScript code in the context of the web site...
WordPress Huge-IT Portfolio Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Huge-IT Portfolio Gallery, in order to run JavaScript code in the context of the web site...
WordPress Instagram Feed: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Instagram Feed, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 653 654 655 656 657 658 659 660 661 663 665 666 667 668 669 670 671 672 673 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020