The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Entity Reference: information disclosure
An attacker can bypass access restrictions to data of Drupal Entity Reference, in order to obtain sensitive information...
Drupal Core: three vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...
Cisco AnyConnect Secure Mobility Client: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco AnyConnect Secure Mobility Client, in order to run JavaScript code in the context of the web site...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
Cisco WSA/ESA/SMA: information disclosure via SNMP Polling
An attacker can bypass access restrictions to data via SNMP Polling of Cisco WSA/ESA/SMA, in order to obtain sensitive information...
Cisco ASR 5000: privilege escalation via Command-Line Interface
An attacker can bypass restrictions via Command-Line Interface of Cisco ASR 5000, in order to escalate his privileges...
Cisco ASR 5000: denial of service via FTP Configuration File
An attacker can generate a fatal error via FTP Configuration File of Cisco ASR 5000, in order to trigger a denial of service...
Cisco ASR 5000: privilege escalation
An attacker can bypass restrictions of Cisco ASR 5000, in order to escalate his privileges...
Cisco Unified Communications Manager: privilege escalation
An attacker can bypass restrictions of Cisco Unified Communications Manager, in order to escalate his privileges...
taglib: denial of service via ID3v2
An attacker can generate a fatal error via ID3v2 of taglib, in order to trigger a denial of service...
Fossil: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Fossil, in order to run JavaScript code in the context of the web site...
Heimdal Kerberos: privilege escalation via Capath Policy
An attacker can bypass restrictions via Capath Policy of Heimdal Kerberos, in order to escalate his privileges...
HPE Data Protector: information disclosure via OMNIRESOLVE
An attacker can bypass access restrictions to data via OMNIRESOLVE of HPE Data Protector, in order to obtain sensitive information...
Node pg: code execution
An attacker can use a vulnerability of Node pg, in order to run code...
Splunk Enterprise: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Splunk Enterprise, in order to run JavaScript code in the context of the web site...
WordPress Gallery Transformation: SQL injection
An attacker can use a SQL injection of WordPress Gallery Transformation, in order to read or alter data...
WordPress RK Responsive Contact Form: SQL injection
An attacker can use a SQL injection of WordPress RK Responsive Contact Form, in order to read or alter data...
WordPress Link Library: SQL injection
An attacker can use a SQL injection of WordPress Link Library, in order to read or alter data...
WordPress I Recommend This: SQL injection
An attacker can use a SQL injection of WordPress I Recommend This, in order to read or alter data...
WordPress AddToAny Share Buttons: information disclosure via Host Header Injection
An attacker can bypass access restrictions to data via Host Header Injection of WordPress AddToAny Share Buttons, in order to obtain sensitive information...
WordPress FAdvertisement: SQL injection
An attacker can use a SQL injection of WordPress FAdvertisement, in order to read or alter data...
FreeBSD 10: information disclosure via Jail SHM
An attacker can bypass access restrictions to data via Jail SHM of FreeBSD 10, in order to obtain sensitive information...
Apple iOS: information disclosure via UI SMS Access Permission
An attacker can bypass access restrictions to data via UI SMS Access Permission of Apple iOS, in order to obtain sensitive information...
Mercurial: file creation via symlink
An attacker can use a symbolic link with Mercurial, in order to create a file outside the repository...
ncurses: NULL pointer dereference via _nc_parse_entry
An attacker can force a NULL pointer to be dereferenced via _nc_parse_entry() of ncurses, in order to trigger a denial of service...
ncurses: out-of-bounds memory reading via append_acs
An attacker can force a read at an invalid address via append_acs() of ncurses, in order to trigger a denial of service, or to obtain sensitive information...
Linux kernel: memory corruption via f2fs
An attacker can generate a memory corruption via f2fs of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
WebSphere AS: information disclosure via Admin Console Cipher Suites
An attacker can bypass access restrictions to data via Admin Console Cipher Suites of IBM WebSphere AS, in order to obtain sensitive information...
Potrace: out-of-bounds memory reading via bm_readbody_bmp
An attacker can force a read at an invalid address via bm_readbody_bmp() of Potrace, in order to trigger a denial of service, or to obtain sensitive information...
Potrace: out-of-bounds memory reading via interpolate_cubic
An attacker can force a read at an invalid address via interpolate_cubic() of Potrace, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 732 733 734 735 736 737 738 739 740 742 744 745 746 747 748 749 750 751 752 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050