The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla Canonical Url: SQL injection
An attacker can use a SQL injection of Joomla Canonical Url, in order to read or alter data...
IPv6: denial of service via Packet Too Big and Fragmentation
An attacker can use ICMP Packet Too Big to force the generation of IPv6 fragments, in order to trigger a denial of service...
Joomla Extra Search: SQL injection
An attacker can use a SQL injection of Joomla Extra Search, in order to read or alter data...
WordPress Gwolle Guestbook: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gwolle Guestbook, in order to run JavaScript code in the context of the web site...
Linux kernel: buffer overflow via sg_ioctl
An attacker can generate a buffer overflow via sg_ioctl() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Bash: denial of service via the popd command
An attacker can generate a fatal error via the intenal command popd of Bash, in order to trigger a denial of service...
TigerVNC: buffer overflow
An attacker can generate a buffer overflow of TigerVNC, in order to trigger a denial of service, and possibly to run code...
OpenBSD: information disclosure via the ELF loader
A local attacker can read a fragment of the OpenBSD kernel stack via the loader of programs using the ELF format, in order to get sensitive information...
glibc: memory leak via getaddrinfo
An attacker can create a memory leak via getaddrinfo of glibc, in order to trigger a denial of service...
glibc: integer overflow via _IO_wstr_overflow
An attacker can generate an integer overflow via _IO_wstr_overflow of glibc, in order to trigger a denial of service, and possibly to run code...
NVIDIA: denial of service
An attacker can generate a fatal error of NVIDIA, in order to trigger a denial of service...
Jenkins Plugins: six vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Knot DNS Resolver: vulnerability via RRSIG
A vulnerability via RRSIG of Knot DNS Resolver was announced...
rpm-ostree: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on rpm-ostree, in order to read or write data in the session...
Cisco IOS, IOS XE: denial of service via ANI
An attacker can send malicious packets to Cisco IOS or IOS XE with ANI, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via IPv6 ANI
An attacker can send malicious IPv6 packets to Cisco IOS or IOS XE with ANI, in order to trigger a denial of service...
WordPress Membership Simplified: SQL injection
An attacker can use a SQL injection of WordPress Membership Simplified, in order to read or alter data...
Apache Struts: code execution via Jakarta Multipart CD/CL
An attacker can use a malicious Content-Disposition/Content-Length header on Apache Struts with Jakarta Multipart installed, in order to run code...
Joomla JooCart: SQL injection
An attacker can use a SQL injection of Joomla JooCart, in order to read or alter data...
Joomla jCart for OpenCart: SQL injection
An attacker can use a SQL injection of Joomla jCart for OpenCart, in order to read or alter data...
Joomla Smart Related Articles: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Smart Related Articles, in order to run JavaScript code in the context of the web site...
Joomla OrdaSoft CCK: SQL injection
An attacker can use a SQL injection of Joomla OrdaSoft CCK, in order to read or alter data...
Joomla Directorix Directory Manager: SQL injection
An attacker can use a SQL injection of Joomla Directorix Directory Manager, in order to read or alter data...
OpenSSH: two vulnerabilities
An attacker can use several vulnerabilities of OpenSSH...
WordPress Invite Anyone: privilege escalation
An attacker can bypass restrictions of WordPress Invite Anyone, in order to escalate his privileges...
WordPress BuddyPress Docs: privilege escalation
An attacker can bypass restrictions of WordPress BuddyPress Docs, in order to escalate his privileges...
Erlang/OTP: buffer overflow via Regular Expressions
An attacker can generate a buffer overflow via Regular Expressions of Erlang/OTP, in order to trigger a denial of service, and possibly to run code...
sscg: security improvement
The security of sscg was improved...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 687 688 689 690 691 692 693 694 695 697 699 700 701 702 703 704 705 706 707 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1003