The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Android OS: multiple vulnerabilities
An attacker can use several vulnerabilities of Android OS...
SIMATIC WinCC Sm@rtClient for Android: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC WinCC Sm@rtClient for Android...
WordPress Loginizer: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Loginizer, in order to force the victim to perform operations...
WordPress Loginizer: SQL injection
An attacker can use a SQL injection of WordPress Loginizer, in order to read or alter data...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
FreeRDP: buffer overflow via Width/Height
An attacker can generate a buffer overflow via Width/Height of FreeRDP, in order to trigger a denial of service, and possibly to run code...
Shotwell: information disclosure via Web Publishing Plugins
An attacker can bypass access restrictions to data via Web Publishing Plugins of Shotwell, in order to obtain sensitive information...
WordPress Podlove Podcast Publisher: SQL injection
An attacker can use a SQL injection of WordPress Podlove Podcast Publisher, in order to read or alter data...
WordPress Easy Modal: SQL injection
An attacker can use a SQL injection of WordPress Easy Modal, in order to read or alter data...
Joomla StreetGuessr Game: SQL injection
An attacker can use a SQL injection of Joomla StreetGuessr Game, in order to read or alter data...
WordPress GamePlan Event and Gym Fitness: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress GamePlan Event and Gym Fitness, in order to run JavaScript code in the context of the web site...
libsndfile: buffer overflow via psf_binheader_writef
An attacker can generate a buffer overflow via psf_binheader_writef() of libsndfile, in order to trigger a denial of service, and possibly to run code...
ClamAV: use after free via wwunpack
An attacker can force the usage of a freed memory area via wwunpack() of ClamAV, in order to trigger a denial of service, and possibly to run code...
ClamAV: buffer overflow via mspack/lzxd.c
An attacker can generate a buffer overflow via mspack/lzxd.c of ClamAV, in order to trigger a denial of service, and possibly to run code...
ClamAV: out-of-bounds memory reading via libclamav/message.c
An attacker can force a read at an invalid address via libclamav/message.c of ClamAV, in order to trigger a denial of service, or to obtain sensitive information...
qpdf: four infinite loops
An attacker can generate an infinite loop of qpdf, in order to trigger a denial of service...
qpdf: three infinite loops
An attacker can generate an infinite loop of qpdf, in order to trigger a denial of service...
OpenBSD: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenBSD...
libzypp: privilege escalation via GPG Check Workflow
An attacker can bypass restrictions via GPG Check Workflow of libzypp, in order to escalate his privileges...
libzypp: two vulnerabilities
An attacker can use several vulnerabilities of libzypp...
Linux kernel: memory corruption via inotify_handle_event
An attacker can generate a memory corruption via inotify_handle_event() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Synology Photo Station: three vulnerabilities
An attacker can use several vulnerabilities of Synology Photo Station...
Cisco Unified Communications Manager: directory traversal
An attacker can traverse directories of Cisco Unified Communications Manager, in order to read a file outside the service root path...
Cisco Unified Communications Manager: SQL injection
An attacker can use a SQL injection of Cisco Unified Communications Manager, in order to read or alter data...
Cisco ASA: information disclosure via Username Enumeration
An attacker can bypass access restrictions to data via Username Enumeration of Cisco ASA, in order to obtain sensitive information...
Cisco ASA: Cross Site Scripting via WebVPN
An attacker can trigger a Cross Site Scripting via WebVPN of Cisco ASA, in order to run JavaScript code in the context of the web site...
Cisco ASA: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco ASA, in order to run JavaScript code in the context of the web site...
PHP: two vulnerabilities
An attacker can use several vulnerabilities of PHP...
WordPress Simple Custom CSS and JS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Simple Custom CSS and JS, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 729 730 731 732 733 734 735 736 737 739 741 742 743 744 745 746 747 748 749 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1058