The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ASR: code execution via CLI Command Injection
An attacker can use a vulnerability via CLI Command Injection of Cisco ASR, in order to run code...
Jabberd2: privilege escalation via SASL
An attacker can bypass restrictions via SASL of Jabberd2, in order to escalate his privileges...
Drupal DrupalChat: two vulnerabilities
An attacker can use several vulnerabilities of Drupal DrupalChat...
Drupal OAuth: privilege escalation
An attacker can bypass restrictions of Drupal OAuth, in order to escalate his privileges...
Horde Image: three vulnerabilities
An attacker can use several vulnerabilities of Horde Image...
Samba: infinite loop via fd_open_atomic
An attacker can generate an infinite loop via fd_open_atomic() of Samba, in order to trigger a denial of service...
PHP: four vulnerabilities
An attacker can use several vulnerabilities of PHP...
Linux kernel: memory leak via virtio_gpu_object_create
An attacker can create a memory leak via virtio_gpu_object_create() of the Linux kernel, in order to trigger a denial of service...
Memcached: denial of service via Worker Threads
An attacker can generate a fatal error via Worker Threads of Memcached, in order to trigger a denial of service...
Joomla: three vulnerabilities
An attacker can use several vulnerabilities of Joomla...
FFmpeg: multiple vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
WordPress Responsive Lightbox by dFactory: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Responsive Lightbox by dFactory, in order to run JavaScript code in the context of the web site...
Telerik UI for ASP.NET AJAX: cryptographic keys disclosure
An attacker can exploit a misuse of cryptographic tools in Telerik UI for ASP.NET AJAX, in order to get secret keys...
Mule Runtime: privilege escalation via OAuth/PingFederate
An attacker can bypass restrictions via OAuth/PingFederate of Mule Runtime, in order to escalate his privileges...
globus: multiple vulnerabilities
An attacker can use several vulnerabilities of globus...
vorbis-tools: two vulnerabilities via oggenc
An attacker can use several vulnerabilities via oggenc of vorbis-tools...
RuggedCom ROX: vulnerability
A vulnerability of RuggedCom ROX was announced...
Webmin: three Cross Site Scripting
An attacker can trigger three Cross Site Scripting of Webmin, in order to run JavaScript code in the context of the web site...
vorbis-tools: out-of-bounds memory reading via oggenc
An attacker can force a read at an invalid address via oggenc of vorbis-tools, in order to trigger a denial of service, or to obtain sensitive information...
VideoLAN VLC: buffer overflow
An attacker can generate a buffer overflow of VideoLAN VLC, in order to trigger a denial of service, and possibly to run code...
Joomla EasySocial: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla EasySocial, in order to run JavaScript code in the context of the web site...
WordPress WP Statistics: SQL injection
An attacker can use a SQL injection of WordPress WP Statistics, in order to read or alter data...
Perl DBD-mysql: two vulnerabilities
An attacker can use several vulnerabilities of Perl DBD-mysql...
kmail: S/MIME cryptographic protection disabling
When an e-mail is deferred, it will be send in plain text even if the end user requested encryption or signature...
libxml2: vulnerability via xmlParsePEReference
A vulnerability via xmlParsePEReference() of libxml2 was announced...
libxml2: buffer overflow via xmlAddID
An attacker can generate a buffer overflow via xmlAddID of libxml2, in order to trigger a denial of service, and possibly to run code...
Puppet mcollective-ssh-security: creation of PEM file
An attacker can use an invalid identity for Puppet mcollective-ssh-security, in order to create a file with the "_pub.pem" suffix...
libarchive: out-of-bounds memory reading
An attacker can force a read at an invalid address of libarchive, in order to trigger a denial of service...
LibTIFF: assertion error via TIFFWriteDirectoryTagCheckedLong8Array
An attacker can force an assertion error via TIFFWriteDirectoryTagCheckedLong8Array of LibTIFF, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 718 719 720 721 722 723 724 725 726 728 730 731 732 733 734 735 736 737 738 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021