The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Social: file upload
An attacker can upload a malicious file on WordPress Social, in order for example to upload a Trojan...
WordPress Seo Spy: file upload
An attacker can upload a malicious file on WordPress Seo Spy, in order for example to upload a Trojan...
WordPress PHP Analytics: file upload
An attacker can upload a malicious file on WordPress PHP Analytics, in order for example to upload a Trojan...
WordPress Easy Social Sharing: code execution
An attacker can use a vulnerability of WordPress Easy Social Sharing, in order to run code...
IBM AIX: denial of service via sysproc
A local attacker can generate a fatal error via sysproc of IBM AIX, in order to trigger a denial of service...
irssi: out-of-bounds memory reading via Format String
An attacker can force a read at an invalid address via Format String of irssi, in order to trigger a denial of service, or to obtain sensitive information...
IBM AIX: privilege escalation via bellmail
A local attacker can bypass restrictions via bellmail of IBM AIX, in order to escalate his privileges...
Linux kernel: memory leak via KVM VMXON
An attacker, inside a guest system, can create a memory leak via KVM VMXON on the Linux kernel, in order to trigger a denial of service on the host system...
libarchive: buffer overflow
An attacker can generate a buffer overflow of libarchive, in order to trigger a denial of service, and possibly to run code...
archive-tar-minitar: directory traversal
An attacker can traverse directories of archive-tar-minitar, in order to overwrite a file outside the service root path...
QEMU: out-of-bounds memory reading via sdhci_sdma_transfer_multi_blocks
An attacker, inside a guest system, can force a read at an invalid address via sdhci_sdma_transfer_multi_blocks() of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
Ghostscript: buffer overflow via jbig2_image_new
An attacker can generate a buffer overflow via jbig2_image_new() of ghostscript, in order to trigger a denial of service, and possibly to run code...
flatpak: privilege escalation
An attacker, inside a guest system, can bypass restrictions of flatpak, in order to escalate his privileges on the host system...
WordPress Google Maps by DM: code execution
An attacker can use a vulnerability of WordPress Google Maps by DM, in order to run code...
WordPress Online Hotel Booking System Pro: SQL injection
An attacker can use a SQL injection of WordPress Online Hotel Booking System Pro, in order to read or alter data...
Joomla JTAG Calendar: SQL injection
An attacker can use a SQL injection of Joomla JTAG Calendar, in order to read or alter data...
Joomla Store Locator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Store Locator, in order to run JavaScript code in the context of the web site...
WordPress User Access Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress User Access Manager, in order to run JavaScript code in the context of the web site...
WordPress FormBuilder: SQL injection
An attacker can use a SQL injection of WordPress FormBuilder, in order to read or alter data...
WordPress FormBuilder: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress FormBuilder, in order to force the victim to perform operations...
Cacti: two vulnerabilities
An attacker can use several vulnerabilities of Cacti...
ASP.NET Core 1.1.0: denial of service via HTTP
An attacker can send malicious HTTP packets to an application linked to ASP.NET Core 1.1.0, in order to trigger a denial of service...
ImageMagick: five vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: three vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
tcpdump: five vulnerabilities
An attacker can use several vulnerabilities of tcpdump...
tcpdump: two vulnerabilities
An attacker can use several vulnerabilities of tcpdump...
tcpdump: four vulnerabilities
An attacker can use several vulnerabilities of tcpdump...
zoneminder: directory traversal via Apache httpd
An attacker can traverse directories via Apache httpd of zoneminder, in order to read a file outside the service root path...
tcpdump: two vulnerabilities
An attacker can use several vulnerabilities of tcpdump...
tcpdump: multiple vulnerabilities
An attacker can use several vulnerabilities of tcpdump...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 671 672 673 674 675 676 677 678 679 681 683 684 685 686 687 688 689 690 691 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090