The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Ads Pro: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ads Pro, in order to run JavaScript code in the context of the web site...
Linux kernel: information disclosure via atyfb_ioctl
A local attacker can read a memory fragment via atyfb_ioctl of the Linux kernel, in order to obtain sensitive information...
Linux kernel: information disclosure via move_pages
An attacker can bypass access restrictions to data via move_pages() of the Linux kernel, in order to obtain sensitive information...
Bazaar: code execution via bzr+ssh
An attacker can use a vulnerability via bzr+ssh of Bazaar, in order to run code...
Ruby: information disclosure via JSON Library
An attacker can bypass access restrictions to data via JSON Library of Ruby, in order to obtain sensitive information...
Ruby: four vulnerabilities
An attacker can use several vulnerabilities of Ruby...
file: buffer overflow via ELF .notes
An attacker can generate a buffer overflow via ELF .notes of file, in order to trigger a denial of service, and possibly to run code...
Apache Struts: two vulnerabilities
An attacker can use several vulnerabilities of Apache Struts...
TYPO3 Core: four vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
389-ds-base: information disclosure via Different Return Codes
An attacker can bypass access restrictions to data via Different Return Codes of 389-ds-base, in order to obtain sensitive information...
WordPress Participants Database: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Participants Database, in order to run JavaScript code in the context of the web site...
libxml2: multiple vulnerabilities
An attacker can use several vulnerabilities of libxml2...
Liblouis: seven vulnerabilities
An attacker can use several vulnerabilities of Liblouis...
glibc: use after free via clntudp_call
An attacker can force the usage of a freed memory area via clntudp_call() of glibc, in order to trigger a denial of service, and possibly to run code...
PSPP: four vulnerabilities
An attacker can use several vulnerabilities of PSPP...
Joomla CheckList: SQL injection
An attacker can use a SQL injection of Joomla CheckList, in order to read or alter data...
Node.js fsk-server: directory traversal
An attacker can traverse directories of Node.js fsk-server, in order to read a file outside the service root path...
Node.js sencisho: directory traversal
An attacker can traverse directories of Node.js sencisho, in order to read a file outside the service root path...
Node.js xtalk: directory traversal
An attacker can traverse directories of Node.js xtalk, in order to read a file outside the service root path...
Joomla Survey Force Deluxe: SQL injection
An attacker can use a SQL injection of Joomla Survey Force Deluxe, in order to read or alter data...
WordPress WpJobBoard: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WpJobBoard, in order to run JavaScript code in the context of the web site...
Joomla One Vote: SQL injection
An attacker can use a SQL injection of Joomla One Vote, in order to read or alter data...
Joomla Pinboard Romet: file upload
An attacker can upload a malicious file on Joomla Pinboard Romet, in order for example to upload a Trojan...
Linux kernel: denial of service via tcp_disconnect
An attacker can generate a fatal error via tcp_disconnect() of the Linux kernel, in order to trigger a denial of service...
OpenJPEG: denial of service via opj_image_create
An attacker can generate a fatal error via opj_image_create() of OpenJPEG, in order to trigger a denial of service...
Mbed TLS: privilege escalation
An attacker can bypass restrictions of Mbed TLS, in order to escalate his privileges...
libidn: integer overflow via _isBidi
An attacker can generate an integer overflow via _isBidi() of libidn, in order to trigger a denial of service, and possibly to run code...
libidn: integer overflow via Punycode
An attacker can generate an integer overflow via Punycode of libidn, in order to trigger a denial of service, and possibly to run code...
libgd2: use after free via gdImagePngPtr
An attacker can force the usage of a freed memory area via gdImagePngPtr() of libgd2, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 738 739 740 741 742 743 744 745 746 748 750 751 752 753 754 755 756 757 758 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090