The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Cool Flickr Slideshow: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Cool Flickr Slideshow, in order to run JavaScript code in the context of the web site...
QEMU: privilege escalation via Multiboot OOB Access
An attacker, inside a guest system, can bypass restrictions via Multiboot OOB Access of QEMU, in order to escalate his privileges on the host system...
Salt: directory traversal via Minion ID
An attacker can traverse directories via Minion ID of Salt, in order to read a file outside the service root path...
Cisco Catalyst 4000: privilege escalation via Dynamic ACL Bypass
An attacker can bypass restrictions via Dynamic ACL Bypass of Cisco Catalyst 4000, in order to escalate his privileges...
Cisco Email Security Appliance: delivery of malicious EML attachment
The Cisco Email Security Appliance product does not correctly filter EML attachments...
Cisco IOS, IOS XE: denial of service via UDP
An attacker can send malicious UDP packets to Cisco IOS, IOS XE, in order to trigger a denial of service...
Cisco Prime LAN Management Solution: privilege escalation via Session Fixation
An attacker can bypass restrictions via Session Fixation of Cisco Prime LAN Management Solution, in order to escalate his privileges...
Cisco IOS, IOS XE: denial of service via SNMP
An attacker can send malicious SNMP packets to Cisco IOS or IOS XE, in order to trigger a denial of service...
Cisco Unified Communications Manager: denial of service via TVS
An attacker can generate a fatal error via TVS of Cisco Unified Communications Manager, in order to trigger a denial of service...
Cisco ASR 920: write access via Platform Usb Modem
An attacker can bypass access restrictions via Platform Usb Modem of Cisco ASR 920, in order to alter data...
Cisco ASR 920: code execution via Platform Usb Modem
An attacker can use a vulnerability via Platform Usb Modem of Cisco ASR 920, in order to run code...
Cisco ASR 5500: denial of service via GPRS Tunneling Protocol
An attacker can send malicious GPRS Tunneling Protocol packets to Cisco ASR 5500, in order to trigger a denial of service...
Apache Struts: code execution via Freemarker
An attacker can use a vulnerability via Freemarker of Apache Struts, in order to run code...
Apache Struts: code execution via REST XStream
An attacker can use a vulnerability via REST XStream of Apache Struts, in order to run code...
GDK-pixbuf: three vulnerabilities
An attacker can use several vulnerabilities of GDK-pixbuf...
gdk-pixbuf: memory corruption via tiff_image_parse
An attacker can generate a memory corruption via tiff_image_parse() of gdk-pixbuf, in order to trigger a denial of service, and possibly to run code...
gdk-pixbuf: memory corruption via gdk_pixbuf__jpeg_image_load_increment
An attacker can generate a memory corruption via gdk_pixbuf__jpeg_image_load_increment() of gdk-pixbuf, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via opj_write_bytes_LE
An attacker can generate a buffer overflow via opj_write_bytes_LE() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via opj_mqc_flush
An attacker can generate a buffer overflow via opj_mqc_flush() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via pgxtoimage
An attacker can generate a buffer overflow via pgxtoimage() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: memory corruption via bin/jp2/convert.c
An attacker can generate a memory corruption via bin/jp2/convert.c of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
Drupal CAPTCHA: denial of service
An attacker can generate a fatal error of Drupal CAPTCHA, in order to trigger a denial of service...
Drupal Clientside Validation: code execution
An attacker can use a vulnerability of Drupal Clientside Validation, in order to run code...
TYPO3 Extensions: possible intrusion on the official extension repository
Due to an authentication error in the SOAP interface of the official TYPO3 repository, extensions uploaded after 22th of August 2017 may have been compromised...
Linux kernel: privilege escalation via sanity_check_raw_super
An attacker can bypass restrictions via sanity_check_raw_super() of the Linux kernel, in order to escalate his privileges...
Linux kernel: denial of service via might_cancel
An attacker can generate a fatal error via might_cancel of the Linux kernel, in order to trigger a denial of service...
Google Chrome: multiple vulnerabilities of September 2017
An attacker can use several vulnerabilities of Google Chrome...
Android OS: multiple vulnerabilities of September 2017
An attacker can use several vulnerabilities of Android OS...
WordPress Gym Management System: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gym Management System, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 739 740 741 742 743 744 745 746 747 749 751 752 753 754 755 756 757 758 759 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090