The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM MQ: denial of service via SDR/CLUSSDR
An attacker can generate a fatal error via SDR/CLUSSDR of IBM MQ, in order to trigger a denial of service...
TYPO3 Content Rating Extbase: SQL injection
An attacker can use a SQL injection of TYPO3 Content Rating Extbase, in order to read or alter data...
TYPO3 Faceted Search: SQL injection
An attacker can use a SQL injection of TYPO3 Faceted Search, in order to read or alter data...
WordPress How-Interest: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress How-Interest, in order to run JavaScript code in the context of the web site...
SAP: multiples vulnerabilities of July 2017
An attacker can use several vulnerabilities of SAP products...
Joomla Cookie Consent: vulnerability
A vulnerability of Joomla Cookie Consent was announced...
Joomla Akobook: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Akobook, in order to run JavaScript code in the context of the web site...
Pulse Connect Secure: two vulnerabilities
An attacker can use several vulnerabilities of Pulse Connect Secure...
Cacti: Cross Site Scripting via aggregate_graphs.php
An attacker can trigger a Cross Site Scripting via aggregate_graphs.php of Cacti, in order to run JavaScript code in the context of the web site...
Cacti: Cross Site Scripting via link.php
An attacker can trigger a Cross Site Scripting via link.php of Cacti, in order to run JavaScript code in the context of the web site...
Cisco ASR 5000: denial of service via BGP
An attacker can send malicious BGP packets to Cisco ASR 5000, in order to trigger a denial of service...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
WordPress Event Espresso: SQL injection
An attacker can use a SQL injection of WordPress Event Espresso, in order to read or alter data...
PuTTY: code execution via CRYPTBASE.DLL
An attacker can use a vulnerability via CRYPTBASE.DLL of PuTTY, in order to run code...
WordPress WP Statistics: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Statistics, in order to run JavaScript code in the context of the web site...
tcpdump: out-of-bounds memory reading via EXTRACT_16BITS
An attacker can force a read at an invalid address via EXTRACT_16BITS() of tcpdump, in order to trigger a denial of service, or to obtain sensitive information...
WordPress Download Manager: open redirect
An attacker can deceive the user of WordPress Download Manager, in order to redirect him to a malicious site...
WordPress Download Manager: code execution
An attacker can use a vulnerability of WordPress Download Manager, in order to run code...
WordPress WP-Members: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP-Members, in order to run JavaScript code in the context of the web site...
phpLDAPadmin: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of phpLDAPadmin, in order to run JavaScript code in the context of the web site...
SQLite: out-of-bounds memory reading via getNodeSize
An attacker can force a read at an invalid address via getNodeSize() of SQLite, in order to trigger a denial of service, or to obtain sensitive information...
mpg123: out-of-bounds memory reading via convert_latin1
An attacker can force a read at an invalid address via convert_latin1() of mpg123, in order to trigger a denial of service, or to obtain sensitive information...
poppler: denial of service via pdftocairo
An attacker can generate a fatal error via pdftocairo of poppler, in order to trigger a denial of service...
poppler: memory leak
An attacker can create a memory leak of poppler, in order to trigger a denial of service...
poppler: denial of service via pdfunite
An attacker can generate a fatal error via pdfunite of poppler, in order to trigger a denial of service...
poppler: memory corruption via JPEG 2000
An attacker can generate a memory corruption via JPEG 2000 of poppler, in order to trigger a denial of service, and possibly to run code...
irssi: vulnerability via Internal Nick List
A vulnerability via Internal Nick List of irssi was announced...
irssi: denial of service via Timestamp
An attacker can generate a fatal error via Timestamp of irssi, in order to trigger a denial of service...
Jetty: information disclosure via Timing Channel Attack
An attacker can bypass access restrictions to data via Timing Channel Attack of Jetty, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 720 721 722 723 724 725 726 727 728 730 732 733 734 735 736 737 738 739 740 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021