The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: buffer overflow via VIRTIO_GPU_CMD_SET_SCANOUT
An attacker, inside a guest system, can generate a read only buffer overflow via the command VIRTIO_GPU_CMD_SET_SCANOUT of QEMU, in order to kil lthe emulated host...
QEMU: buffer overflow via virtio-gpu-3d
An attacker, inside a guest system, can generate a buffer overflow via virtio-gpu-3d of QEMU, in order to trigger a denial of service against the host system...
tor: buffer overflow
An attacker can generate a one byte, read only, buffer overflow of tor, in order to trigger a denial of service...
BusyBox: memory corruption via hush
An attacker can generate a memory corruption via the command "hush" of BusyBox, in order to trigger a denial of service, and possibly to run code...
WordPress Xtreme Locator: SQL injection
An attacker can use a SQL injection of WordPress Xtreme Locator, in order to read or alter data...
WordPress ZX_CSV Upload: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress ZX_CSV Upload, in order to force the victim to perform operations...
Xen: privilege escalation via SYSCALL
An attacker can trigger a debug trap on a SYSCALL instruction in a guest system managed by Xen, in order to get guest operating system privileges on non Linux systems...
OpenJPEG: two vulnerabilities
An attacker can use several vulnerabilities of OpenJPEG...
WordPress 404 Plugin: SQL injection
An attacker can use a SQL injection of WordPress 404 Plugin, in order to read or alter data...
WordPress WP Private Messages: SQL injection
An attacker can use a SQL injection of WordPress WP Private Messages, in order to read or alter data...
OpenSSH: five vulnerabilities
An attacker can use several vulnerabilities of OpenSSH...
FreeIPA: two vulnerabilities
An attacker can use several vulnerabilities of FreeIPA...
Squid cache: two vulnerabilities
An attacker can use several vulnerabilities of Squid cache...
Samba: three vulnerabilities
An attacker can use several vulnerabilities of Samba...
WordPress WP Support Plus Responsive Ticket: SQL injection
An attacker can use a SQL injection of WordPress WP Support Plus Responsive Ticket, in order to read or alter data...
Joomla com_rpl: SQL injection
An attacker can use a SQL injection of Joomla com_rpl, in order to read or alter data...
SPIP: Cross Site Scripting via info_plugin.php
An attacker can trigger a Cross Site Scripting via info_plugin.php of SPIP, in order to run JavaScript code in the context of the web site...
SPIP: Cross Site Scripting via puce_statut.php
An attacker can trigger a Cross Site Scripting via puce_statut.php of SPIP, in order to run JavaScript code in the context of the web site...
audacious, game-music-emu: multiple vulnerabilities
An attacker can use several vulnerabilities of game-music-emu and audacious...
Debian: privilege escalation via Tomcat
An attacker can bypass restrictions via Tomcat of Debian, in order to escalate his privileges...
Debian: privilege escalation via Tomcat
An attacker can bypass restrictions via Tomcat of Debian, in order to escalate his privileges...
libupnp: buffer overflow
An attacker can generate a buffer overflow of libupnp, in order to trigger a denial of service, and possibly to run code...
most: code execution via Shell Injection
An attacker can use a vulnerability via Shell Injection of most, in order to run code...
IBM Tivoli Storage Manager: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of IBM Tivoli Storage Manager, in order to force the victim to perform operations...
Node.js modules: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on downloads by modules for Node.js, in order to read or write data in the session and notably inject arbitrary programs...
HP LoadRunner, Performance Center: buffer overflow via MMS
An attacker can generate a buffer overflow via an MMS packet sent to an HP LoadRunner or Performance Center device, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: denial of service via RADIUS
An attacker can send malicious RADIUS packets to an F5 BIG-IP device, in order to trigger a denial of service...
F5 BIG-IP: denial of service via the traffic management
An attacker can send specially crafted packets TCP to an F5 BIG-IP device, in order to make it halt...
Exim: information disclosure via DKIM Signing Key
An attacker can read Exim logs, in order to obtain the DKIM signature key...
IBM AIX: privilege escalation via bellmail
An attacker can bypass restrictions via bellmail of IBM AIX, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 662 663 664 665 666 667 668 669 671 673 674 675 676 677 678 679 680 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020