The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
irssi: two vulnerabilities
An attacker can use several vulnerabilities of irssi...
Cisco Email Security and Content Security Management Appliance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting in Cisco Email Security Appliance and Content Security Management Appliance, in order to run JavaScript code in the context of the web site...
Cisco Prime Collaboration Assurance: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Prime Collaboration Assurance, in order to force the victim to perform operations...
Red Hat JBoss Enterprise Application Platform: three vulnerabilities
An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform...
Cisco Prime Data Center Network Manager: privilege escalation via debug support functions
An attacker can access to the debug support service included in Cisco Prime Data Center Network Manager, in order to get administrator privileges at the system level...
Cisco Prime Data Center Network Manager: static password for privileged account
An attacker can use an account created by Cisco Prime Data Center Network Manager with a static password and administration privileges, in order to escalate his privileges...
Cisco AnyConnect Secure Mobility Client: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Cisco AnyConnect Secure Mobility Client for MS-Windows, in order to run code with the system privileges...
Joomla Payage: SQL injection
An attacker can use a SQL injection of Joomla Payage, in order to read or alter data...
Linux kernel: code execution via trace
A local privileged attacker can use a vulnerability of the execution tracing function of the Linux kernel, in order to run code with kernel privileges...
apng2gif: integer overflow
An attacker can generate an integer overflow of apng2gif, in order to trigger a denial of service, and possibly to run code...
lintian: code execution via a YAML file
An attacker can use a vulnerability of lintian via a YAML file, in order to run code...
QEMU: memory leak via the EHCI emulation
A privileged attacker, inside a guest system, can create a memory leak via the EHCI emulation in QEMU, in order to trigger a denial of service on the host system...
Ming: integer overflow
An attacker can generate an integer overflow of Ming, in order to trigger a denial of service, and possibly to run code...
OTRS Help Desk: privilege escalation via a special URL
An attacker can fetch a special URL from OTRS Help Desk, in order to escalate his privileges...
Jenkins Favorite: two vulnerabilities
An attacker can use several vulnerabilities of Jenkins Favorite...
Apache Tomcat: error page tampering
An attacker can trigger an HTTP error in Apache Tomcat, in order to corrupt the error page documents...
Android OS: multiple vulnerabilities of June 2017
An attacker can use several vulnerabilities of Android OS...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
QEMU: infinite loop in xhci_kick_ep
An attacker, inside a guest system, can generate an infinite loop via xhci_kick_ep() of QEMU, in order to trigger a denial of service on the host system...
QEMU: memory leak via the AHCI emulation
A privileged attacker, inside a guest system, can create a memory leak via the AHCI emulation in QEMU, in order to trigger a denial of service on the host system...
poppler: NULL pointer dereference in pdfunite
An attacker can force a NULL pointer to be dereferenced in pdfunite of poppler, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 711 712 713 714 715 716 717 718 719 721 723 724 725 726 727 728 729 730 731 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070