The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress WooCommerce Product Vendors: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WooCommerce Product Vendors, in order to run JavaScript code in the context of the web site...
Data ONTAP: denial of service via User Input String
An attacker can generate a fatal error via User Input String of Data ONTAP, in order to trigger a denial of service...
Linux kernel: integer overflow via qla2x00_sysfs_write_optrom_ctl
An attacker can generate an integer overflow via qla2x00_sysfs_write_optrom_ctl of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
IBM Notes: denial of service via Malicious Link
An attacker can generate a fatal error via Malicious Link of IBM Notes, in order to trigger a denial of service...
IBM Notes: denial of service via Many File Select Dialog
An attacker can generate a fatal error via Many File Select Dialog of IBM Notes, in order to trigger a denial of service...
libzip: use after free via _zip_dirent_read
An attacker can force the usage of a freed memory area via _zip_dirent_read() of libzip, in order to trigger a denial of service, and possibly to run code...
dnsdist: privilege escalation via API Authentication
An attacker can bypass restrictions via API Authentication of dnsdist, in order to escalate his privileges...
dnsdist: denial of service via Backend Responses
An attacker can generate a fatal error via Backend Responses of dnsdist, in order to trigger a denial of service...
Asterisk: denial of service via res_pjsip
An attacker can generate a fatal error via res_pjsip of Asterisk, in order to trigger a denial of service...
Asterisk: code execution via app_minivm
An attacker can use a vulnerability via app_minivm of Asterisk, in order to run code...
Asterisk: information disclosure via RTP Stack
An attacker can bypass access restrictions to data via RTP Stack of Asterisk, in order to obtain sensitive information...
Apache Log4j: external XML entity injection
An attacker can transmit malicious XML data to Apache Log4j, in order to read a file, scan sites, or trigger a denial of service...
HPE Operations Orchestration: code execution
An attacker can use a vulnerability of HPE Operations Orchestration, in order to run code...
OpenEXR: three vulnerabilities
An attacker can use several vulnerabilities of OpenEXR...
GraphicsMagick: NULL pointer dereference via SVGStartElement
An attacker can force a NULL pointer to be dereferenced via SVGStartElement() of GraphicsMagick, in order to trigger a denial of service...
GraphicsMagick: buffer overflow via GetStyleTokens
An attacker can generate a buffer overflow via GetStyleTokens() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: out-of-bounds memory reading via ReadSUNImage
An attacker can force a read at an invalid address via ReadSUNImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: use after free via ReadWMFImage
An attacker can force the usage of a freed memory area via ReadWMFImage() of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
GraphicsMagick: out-of-bounds memory reading via ReadMNGImage
An attacker can force a read at an invalid address via ReadMNGImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: denial of service via ReadXBMImage
An attacker can generate a fatal error via ReadXBMImage() of GraphicsMagick, in order to trigger a denial of service...
Node.js serverlyr: directory traversal
An attacker can traverse directories of Node.js serverlyr, in order to read a file outside the service root path...
Node.js safe-eval: privilege escalation
An attacker can bypass restrictions of Node.js safe-eval, in order to escalate his privileges...
Node.js fs-git: code execution
An attacker can use a vulnerability of Node.js fs-git, in order to run code...
Node.js ua-parser: denial of service via User-Agent
An attacker can generate a fatal error via User-Agent of Node.js ua-parser, in order to trigger a denial of service...
Node.js tinyserver2: directory traversal
An attacker can traverse directories of Node.js tinyserver2, in order to read a file outside the service root path...
Node.js list-n-stream: directory traversal
An attacker can traverse directories of Node.js list-n-stream, in order to read a file outside the service root path...
Node.js node-simple-router: directory traversal
An attacker can traverse directories of Node.js node-simple-router, in order to read a file outside the service root path...
PAN-OS: external XML entity injection via GlobalProtect
An attacker can transmit malicious XML data via GlobalProtect to PAN-OS, in order to read a file, scan sites, or trigger a denial of service...
PAN-OS: Cross Site Scripting via GlobalProtect
An attacker can trigger a Cross Site Scripting via GlobalProtect of PAN-OS, in order to run JavaScript code in the context of the web site...
PHP: four vulnerabilities
An attacker can use several vulnerabilities of PHP...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 737 738 739 740 741 742 743 744 745 747 749 750 751 752 753 754 755 756 757 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050