The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Etoile Ultimate Product Catalog: SQL injection
An attacker can use a SQL injection of WordPress Etoile Ultimate Product Catalog, in order to read or alter data...
WordPress Etoile Ultimate Product Catalog: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Etoile Ultimate Product Catalog, in order to run JavaScript code in the context of the web site...
glpi: SQL injection
An attacker can use a SQL injection of glpi, in order to read or alter data...
Drupal services_views: vulnerability
A vulnerability of Drupal services_views was announced...
Drupal ajax_facets: vulnerability
A vulnerability of Drupal ajax_facets was announced...
Drupal baidu_analytics: vulnerability
A vulnerability of Drupal baidu_analytics was announced...
Drupal html_title: vulnerability
A vulnerability of Drupal html_title was announced...
Drupal Alinks: privilege escalation
An attacker can bypass restrictions of Drupal Alinks, in order to escalate his privileges...
LXC: privilege escalation via TIOCSTI
An attacker can bypass restrictions via TIOCSTI of LXC, in order to escalate his privileges...
Joomla Ultimate Property Listing: SQL injection
An attacker can use a SQL injection of Joomla Ultimate Property Listing, in order to read or alter data...
Joomla SIMGenealogy: SQL injection
An attacker can use a SQL injection of Joomla SIMGenealogy, in order to read or alter data...
Joomla PHP-Bridge: SQL injection
An attacker can use a SQL injection of Joomla PHP-Bridge, in order to read or alter data...
Joomla LMS King Professional: SQL injection
An attacker can use a SQL injection of Joomla LMS King Professional, in order to read or alter data...
Joomla Event Registration Pro: SQL injection
An attacker can use a SQL injection of Joomla Event Registration Pro, in order to read or alter data...
Varnish Cache: assertion error via Transfer-Encoding Chunked
An attacker can force an assertion error via Transfer-Encoding Chunked of Varnish Cache, in order to trigger a denial of service...
WordPress Event List: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Event List, in order to run JavaScript code in the context of the web site...
WordPress Easy Testimonials: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easy Testimonials, in order to run JavaScript code in the context of the web site...
WebSphere AS Traditional: information disclosure via PasswordUtil AES Password Encryption
An attacker can bypass access restrictions to data via PasswordUtil AES Password Encryption of IBM WebSphere Application Server Traditional, in order to obtain sensitive information...
Bash: privilege escalation via Path Autocompletion Double Quote
An attacker can bypass restrictions via Path Autocompletion Double Quote of Bash, in order to escalate his privileges...
Trend Micro OfficeScan: two vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan...
Trend Micro InterScan Messaging Security: two vulnerabilities
An attacker can use several vulnerabilities of Trend Micro InterScan Messaging Security...
Ghostscript: out-of-bounds memory reading via igc_reloc_struct_ptr
An attacker can force a read at an invalid address via igc_reloc_struct_ptr() of Ghostscript, in order to trigger a denial of service, or to obtain sensitive information...
Ghostscript: buffer overflow via gs_alloc_ref_array
An attacker can generate a buffer overflow via gs_alloc_ref_array() of Ghostscript, in order to trigger a denial of service, and possibly to run code...
Ghostscript: out-of-bounds memory reading via Ins_JMPR
An attacker can force a read at an invalid address via Ins_JMPR() of Ghostscript, in order to trigger a denial of service, or to obtain sensitive information...
Ghostscript: buffer overflow via gx_ttfReader__Read
An attacker can generate a buffer overflow via gx_ttfReader__Read() of Ghostscript, in order to trigger a denial of service, and possibly to run code...
Ghostscript: out-of-bounds memory reading via Ins_MDRP
An attacker can force a read at an invalid address via Ins_MDRP() of Ghostscript, in order to trigger a denial of service, or to obtain sensitive information...
Ghostscript: use after free via Ins_IP
An attacker can force the usage of a freed memory area via Ins_IP() of Ghostscript, in order to trigger a denial of service, and possibly to run code...
Ghostscript: out-of-bounds memory reading via Ins_MIRP
An attacker can force a read at an invalid address via Ins_MIRP() of Ghostscript, in order to trigger a denial of service, or to obtain sensitive information...
pki-core: privilege escalation via Mock CMC Authentication Plugin
An attacker can bypass restrictions via Mock CMC Authentication Plugin of pki-core, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 728 729 730 731 732 733 734 735 736 738 740 741 742 743 744 745 746 747 748 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050