The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Symantec Endpoint Protection: two vulnerabilities
An attacker can use several vulnerabilities of Symantec Endpoint Protection...
Joomla Akeeba Backup: directory traversal
An attacker can traverse directories of Joomla Akeeba Backup, in order to read a file outside the service root path...
EMI caNl C: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on EMI caNl C, in order to read or write data in the session...
Apereo CAS Server: privilege escalation via /configserver et /cas/status/metrics
An attacker can bypass restrictions via /configserver et /cas/status/metrics of Apereo CAS Server, in order to escalate his privileges...
WordPress: six vulnerabilities
An attacker can use several vulnerabilities of WordPress...
QEMU: infinite loop via ohci_service_ed_list
An attacker can generate an infinite loop via ohci_service_ed_list() of QEMU, in order to trigger a denial of service...
SPIP: code execution via balises.php
An attacker can use pages using #HTTP_HEADER on SPIP, in order to run PHP code...
WordPress Opti SEO: code execution
An attacker can use a vulnerability of WordPress Opti SEO, in order to run code...
Joomla Extensions: multiple SQL injections
An attacker can use several SQL injections of Joomla extensions...
Dotclear: Cross Site Scripting via admin/blogs.php
An attacker can trigger a Cross Site Scripting via admin/blogs.php of Dotclear, in order to run JavaScript code in the context of the web site...
Wireshark: nine vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
KDE Kio: information disclosure via PAC File
An attacker can bypass access restrictions to data via PAC File of KDE Kio, in order to obtain sensitive information...
ruby-zip: directory traversal
An attacker can traverse directories of ruby-zip, in order to create a file outside the service root path...
IBM WebSphere MQ: denial of service via Threaded Channel Agents
An attacker can generate a fatal error via Threaded Channel Agents of IBM WebSphere MQ, in order to trigger a denial of service...
WordPress WP2Android: file upload via images.php
An attacker can upload a malicious file via images.php on WordPress WP2Android, in order for example to upload a Trojan...
NagVis: Cross Site Scripting via std_table.php
An attacker can trigger a Cross Site Scripting via std_table.php of NagVis, in order to run JavaScript code in the context of the web site...
WordPress Webapp builder: file upload via images.php
An attacker can upload a malicious file via images.php on WordPress Webapp builder, in order for example to upload a Trojan...
WordPress Mobile app Builder: file upload via images.php
An attacker can upload a malicious file via images.php on WordPress Mobile app Builder, in order for example to upload a Trojan...
WordPress mobile-friendly-app-builder-by-easytouch: file upload via images.php
An attacker can upload a malicious file via images.php on WordPress mobile-friendly-app-builder-by-easytouch, in order for example to upload a Trojan...
FreeIPA: privilege escalation via CA Commands
An attacker can bypass restrictions via ca-del, ca-disable and ca-enable commands of FreeIPA, in order to escalate his privileges...
Tenable Nessus: file upload via Windows
An attacker can upload a malicious file via Windows on Tenable Nessus, in order for example to upload a Trojan...
IBM QRadar: multiple vulnerabilities
An attacker can use several vulnerabilities of IBM QRadar...
OpenBSD: Man-in-the-Middle via WPA
An attacker can act as a WiFi access point, in order to read or write data in the session of OpenBSD client hosts...
IBM DB2: privilege escalation via Renamed Table
An attacker can bypass restrictions via Renamed Table of IBM DB2, in order to escalate his privileges...
VIM: two vulnerabilities
An attacker can use several vulnerabilities of VIM...
Apache CXF: privilege escalation via OAuth2 Hawk/JOSE
An attacker can bypass restrictions via OAuth2 Hawk/JOSE of Apache CXF, in order to escalate his privileges...
Drupal Breakpoint Panels: vulnerability
A vulnerability of Drupal Breakpoint Panels was announced...
Drupal AES: vulnerability
A vulnerability of Drupal AES was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 682 683 684 685 686 687 688 689 691 693 694 695 696 697 698 699 700 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1059