The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ConnMan: code execution via DNS Proxy
An attacker can use a vulnerability via DNS Proxy of ConnMan, in order to run code...
Tenshi: denial of service via tenshi.pid
An attacker can generate a fatal error via tenshi.pid of Tenshi, in order to trigger a denial of service...
FontForge: multiple vulnerabilities
An attacker can use several vulnerabilities of FontForge...
WordPress Embed Images in Comments: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Embed Images in Comments, in order to run JavaScript code in the context of the web site...
Joomla Price Alert: SQL injection
An attacker can use a SQL injection of Joomla Price Alert, in order to read or alter data...
Joomla MasterForms: SQL injection
An attacker can use a SQL injection of Joomla MasterForms, in order to read or alter data...
Joomla Bargain Product: SQL injection
An attacker can use a SQL injection of Joomla Bargain Product, in order to read or alter data...
Synology Photo Station: Cross Site Scripting via PixlrEditorHandler.php
An attacker can trigger a Cross Site Scripting via PixlrEditorHandler.php of Synology Photo Station, in order to run JavaScript code in the context of the web site...
libpng: NULL pointer dereference via png_handle_eXIf
An attacker can force a NULL pointer to be dereferenced via png_handle_eXIf() of libpng, in order to trigger a denial of service...
PySAML2: file reading via XML
A local attacker can read a file via XML of PySAML2, in order to obtain sensitive information...
WordPress BackupGuard: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress BackupGuard, in order to run JavaScript code in the context of the web site...
Telerik UI for ASP.NET AJAX: file upload via Direct Object Reference
An attacker can upload a malicious file via RadAsyncUpload on Telerik UI for ASP.NET AJAX, in order for example to upload a Trojan...
Telerik UI for ASP.NET AJAX: file upload via RadAsyncUpload
An attacker can upload a malicious file on Telerik UI for ASP.NET AJAX, in order for example to upload a Trojan...
Nagios: denial of service via nagios.lock PID File
An attacker can generate a fatal error via nagios.lock PID File of Nagios, in order to trigger a denial of service...
WordPress Bridge: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Bridge, in order to run JavaScript code in the context of the web site...
Xen: denial of service via add-to-physmap
An attacker, inside a guest system, can generate a fatal error via add-to-physmap of Xen, in order to trigger a denial of service on the host system...
Aodh: privilege escalation via Alarm Actions
An attacker can bypass restrictions via Alarm Actions of Aodh, in order to escalate his privileges...
Synology DNS Server: file creation via domain_name
A local attacker can create a file via domain_name of Synology DNS Server, in order to obtain sensitive information...
GitLab: code execution via ssh
An attacker can use a vulnerability via ssh of GitLab, in order to run code...
Joomla Calendar Planner: SQL injection
An attacker can use a SQL injection of Joomla Calendar Planner, in order to read or alter data...
Linux kernel: out-of-bounds memory reading via net/sctp
An attacker can force a read at an invalid address via net/sctp of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
JBoss Enterprise Application Platform: information disclosure via Internal IP Address
An attacker can bypass access restrictions to data via Internal IP Address of JBoss Enterprise Application Platform, in order to obtain sensitive information...
BMC Patrol: privilege escalation via mcmnm
An attacker can bypass restrictions via mcmnm of BMC Patrol, in order to escalate his privileges...
Cacti: Cross Site Scripting via lib/functions.php
An attacker can trigger a Cross Site Scripting via lib/functions.php of Cacti, in order to run JavaScript code in the context of the web site...
extplorer: code execution via userfile
An attacker can use a vulnerability via userfile of extplorer, in order to run code...
PCRE: three vulnerabilities
An attacker can use several vulnerabilities of PCRE...
Joomla Bye Bye Password: information disclosure
An attacker can bypass access restrictions to data of Joomla Bye Bye Password, in order to obtain sensitive information...
QEMU: denial of service via Empty CDROM
An attacker, inside a guest system, can generate a fatal error via Empty CDROM of QEMU, in order to trigger a denial of service on the host system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 734 735 736 737 738 739 740 741 742 744 746 747 748 749 750 751 752 753 754 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070