The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
QEMU: memory leak via the audio driver es1370
An attacker, inside a guest system, can create a memory leak in the ac97 audio device driver of QEMU, in order to trigger a denial of service against the host system...
Oracle Solaris: vulnerabilities of January 2017
An attacker can use several vulnerabilities of Oracle Solaris...
QEMU: memory leak via the audio driver ac97
An attacker in tghe guest system can create a memory leak in the ac97 audio device driver of QEMU, in order to trigger a denial of service against the host system...
Oracle Java: vulnerabilities of January 2017
An attacker can use several vulnerabilities of Oracle Java...
IBM WebSphere AS: denial of service via a SOAP interface
An attacker can generate an huge usage of resources via a SOAP interface of IBM WebSphere AS, in order to trigger a denial of service...
PHPMailer: directory traversal via msgHTML
An attacker can traverse directories via msgHTML() of PHPMailer, in order to read a file outside the service root path...
Oracle Communications Network Intelligence: code execution
An attacker can use a vulnerability of Oracle Communications Network Intelligence, in order to run code...
Oracle Outside In Technology: vulnerabilities of January 2017
An attacker can use several vulnerabilities of Oracle Outside In Technology...
Oracle Fusion Middleware: vulnerabilities of January 2017
An attacker can use several vulnerabilities of Oracle Fusion Middleware...
Oracle Database: vulnerabilities of January 2017
An attacker can use several vulnerabilities of Oracle Database...
Python Xdg: file corruption via /tmp/pyxdg-runtime-dir-fallback-victim
A local attacker can create a symbolic link named /tmp/pyxdg-runtime-dir-fallback-victim, in order to alter the pointed file, with privileges of Python Xdg...
McAfee ePO: Cross Site Scripting via Web User Interface
An attacker can trigger a Cross Site Scripting via Web User Interface of McAfee ePO, in order to run JavaScript code in the context of the web site...
Linux kernel: NULL pointer dereference via mcryptd
A local attacker can force a NULL pointer to be dereferenced via mcryptd in the Linux kernel, in order to trigger a denial of service...
QEMU: file corruption via 9pfs
A local attacker can create a symbolic link, in order to access files with the privileges of QEMU on the host system...
WordPress Stop User Enumeration: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Stop User Enumeration, in order to run JavaScript code in the context of the web site...
WordPress Direct Download for WooCommerce: directory traversal
An attacker can traverse directories of WordPress Direct Download for WooCommerce, in order to read a file outside the service root path...
encfs: security improvement via MAC Headers
The security of encfs was improved via MAC Headers...
Icinga: Cross Site Scripting via classic-UI
An attacker can trigger a Cross Site Scripting via classic-UI of Icinga, in order to run JavaScript code in the context of the web site...
ark: code execution
An attacker can use a vulnerability of ark, in order to run code...
SimGear: directory traversal
An attacker can traverse directories of SimGear, in order to read a file outside the service root path...
Zope 2: Cross Site Scripting via manage_tabs and manage_container
An attacker can trigger a Cross Site Scripting via manage_tabs, manage_container of Zope 2, in order to run JavaScript code in the context of the web site...
IBM InfoSphere DataStage: information disclosure via URLs
An attacker can collect URLs to an IBM InfoSphere DataStage server, in order to get sensitive information...
HPE Diagnostics: two vulnerabilities
An attacker can use several vulnerabilities of HPE Diagnostics...
WordPress cmw-speakers: SQL injection
An attacker can use a SQL injection of WordPress cmw-speakers, in order to read or alter data...
onionshare: file corruption via /tmp
A local attacker can create symbolic links in /tmp, in order to alter the referenced files, with the privileges of onionshare...
Mozilla NSS: update of the certification authority list
The security of Mozilla NSS was improved with an updated list of CA certificates...
pdns: multiple vulnerabilities
An attacker can use several vulnerabilities of pdns...
icoutils: multiple vulnerability
Some vulnerabilities of icoutils was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 667 668 669 670 671 672 673 674 675 677 679 680 681 682 683 684 685 686 687 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1003