The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
3 Jenkins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins...
1 Linux kernel: denial of service via setprocattr
An attacker can generate a fatal error via setprocattr() on the Linux kernel, in order to trigger a denial of service...
2 libevent: three vulnerabilities
An attacker can use several vulnerabilities of libevent...
2 Joomla JoomBlog: SQL injection
An attacker can use a SQL injection of Joomla JoomBlog, in order to read or alter data...
2 Joomla Music Collection: SQL injection
An attacker can use a SQL injection of Joomla Music Collection, in order to read or alter data...
2 Joomla GeoContent: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla GeoContent, in order to run JavaScript code in the context of the web site...
2 Linux kernel: denial of service via RSYSLOG and SYN Cookie Protection
An attacker can generate a fatal error via the RSYSLOG service and the SYN Cookie Protection of the Linux kernel, in order to trigger a denial of service...
1 Linux kernel: information disclosure via CONFIG_TIMER_STATS
An attacker can bypass access restrictions to data via CONFIG_TIMER_STATS on the Linux kernel, in order to obtain sensitive information...
2 Lynx: vulnerability via URL Parsing
A vulnerability via URL Parsing of Lynx was announced...
2 netpbm: memory corruption via TIFFRGBA
An attacker can generate a memory corruption via TIFFRGBA of netpbm, in order to trigger a denial of service, and possibly to run code...
2 netpbm: two vulnerabilities
An attacker can use several vulnerabilities of netpbm...
1 Microsoft Windows: information disclosure via gdi32.dll
A local attacker can trigger a read only buffer overflow via gdi32.dll of Microsoft Windows via a data structure of type EMR_SETDIBITSTODEVICE, in order to get sensitive information...
1 QEMU: infinite loop via sdhci_sdma_transfer_multi_blocks
An attacker can generate an infinite loop via sdhci_sdma_transfer_multi_blocks() of QEMU, in order to trigger a denial of service...
4 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
2 Linux kernel: assertion error via sctp_wait_for_sndbuf
An attacker can force an assertion error via sctp_wait_for_sndbuf() on the Linux kernel, in order to trigger a denial of service...
2 WordPress Stats Wp: code execution
An attacker can use a vulnerability of WordPress Stats Wp, in order to run code...
3 WordPress Web Tripwire: file upload
An attacker can upload a malicious file on WordPress Web Tripwire, in order for example to upload a Trojan...
2 WordPress Posts in Page: directory traversal
An attacker can traverse directories of WordPress Posts in Page, in order to read a file outside the service root path...
1 QEMU: infinite loop via xhci_kick_epctx
An attacker can generate an infinite loop via xhci_kick_epctx() of QEMU, in order to trigger a denial of service...
3 Siemens SIMATIC: privilege escalation via SIMATIC Logon
An attacker can bypass the authentication to the Logon module of Siemens SIMATIC, in order to escalate his privileges...
1 Linux kernel: information disclosure via nfnetlink_rcv_batch
A local attacker can read a memory fragment via nfnetlink_rcv_batch() on the Linux kernel, in order to obtain sensitive information...
3 SAP: multiples vulnerabilities of February 2017
An attacker can use several vulnerabilities of SAP products...
3 Apache Tomcat: infinite loop via AbstractInputBuffer.java
An attacker can generate an infinite loop via AbstractInputBuffer.java of Apache Tomcat, in order to trigger a denial of service...
2 Vim: integer overflow via Spell File
An attacker can generate an integer overflow via Spell File of Vim, in order to trigger a denial of service, and possibly to run code...
2 WordPress Easy Table: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easy Table, in order to run JavaScript code in the context of the web site...
1 Riverbed Steelhead: information disclosure via Private Keys
An attacker can bypass access restrictions to data of Riverbed Steelhead, in order to obtain sensitive information...
2 F5 BIG-IP: information disclosure via /var/log/restjavad.0.log
An attacker can bypass access restrictions to data via /var/log/restjavad.0.log of F5 BIG-IP, in order to obtain sensitive information...
2 WordPress Javo Themes Spot: directory traversal
An attacker can traverse directories of WordPress Javo Themes Spot, in order to read a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 675 676 677 678 679 680 681 682 683 685 687 688 689 690 691 692 693 694 695 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 995