The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla Hotornot2: file upload
An attacker can upload a malicious file on Joomla Hotornot2, in order for example to upload a Trojan...
WordPress Fitness Trainer: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Fitness Trainer, in order to run JavaScript code in the context of the web site...
libwpd: out-of-bounds memory reading via WPXTableList
An attacker can force a read at an invalid address via WPXTableList of libwpd, in order to trigger a denial of service, or to obtain sensitive information...
NetBSD: denial of service via openat Vnode Reference Leak
An attacker can generate a fatal error via openat() Vnode Reference Leak of NetBSD, in order to trigger a denial of service...
NetBSD: privilege escalation via Context Handling
An attacker can bypass restrictions via Context Handling of NetBSD, in order to escalate his privileges...
NetBSD: buffer overflow via bivideo/pm/sbd/sti
An attacker can generate a buffer overflow via bivideo/pm/sbd/sti of NetBSD, in order to trigger a denial of service, and possibly to run code...
IBM DB2: privilege escalation via CLIENT Authentication Type
An attacker can bypass restrictions via CLIENT Authentication Type of IBM DB2, in order to escalate his privileges...
MIT krb5: use after free via GSS-API
An attacker can force the usage of a freed memory area via GSS-API of MIT krb5, in order to trigger a denial of service, and possibly to run code...
Symantec Encryption Desktop: denial of service
An attacker can generate a fatal error of Symantec Encryption Desktop, in order to trigger a denial of service...
Joomla Easy Joomla Backup: information disclosure
An attacker can bypass access restrictions to data of Joomla Easy Joomla Backup, in order to obtain sensitive information...
libarchive: out-of-bounds memory reading via XAR
An attacker can force a read at an invalid address via XAR of libarchive, in order to trigger a denial of service, or to obtain sensitive information...
tcpdump: multiple vulnerabilities
An attacker can use several vulnerabilities of tcpdump...
Node.js qs: denial of service
An attacker can generate a fatal error of Node.js qs, in order to trigger a denial of service...
IBM DB2: privilege escalation via File Overwrite
An attacker can bypass restrictions via File Overwrite of IBM DB2, in order to escalate his privileges...
IBM DB2: denial of service via Connect Server
An attacker can generate a fatal error via Connect Server of IBM DB2, in order to trigger a denial of service...
IBM DB2: privilege escalation via Root Access
An attacker can bypass restrictions via Root Access of IBM DB2, in order to escalate his privileges...
IBM DB2: information disclosure via Error Log
An attacker can bypass access restrictions to data via Error Log of IBM DB2, in order to obtain sensitive information...
IBM DB2: privilege escalation
An attacker can bypass restrictions of IBM DB2, in order to escalate his privileges...
IBM QRadar SIEM: information disclosure
An attacker can bypass access restrictions to data of IBM QRadar SIEM, in order to obtain sensitive information...
unrar-free: directory traversal
An attacker can traverse directories of unrar-free, in order to create a file outside the service root path...
Oracle Java, Apache Xerces: denial of service via FTP
An attacker can interrupt a FTP transfer, in order to trigger a denial of service on the Oracle Java or Apache Xerces client...
WordPress WatuPRO: SQL injection
An attacker can use a SQL injection of WordPress WatuPRO, in order to read or alter data...
Node.js tiny-http: directory traversal
An attacker can traverse directories of Node.js tiny-http, in order to read a file outside the service root path...
Node.js serveryaozeyan: directory traversal
An attacker can traverse directories of Node.js serveryaozeyan, in order to read a file outside the service root path...
Node.js serverliujiayi1: directory traversal
An attacker can traverse directories of Node.js serverliujiayi1, in order to read a file outside the service root path...
Node.js iter-http: directory traversal
An attacker can traverse directories of Node.js iter-http, in order to read a file outside the service root path...
Node.js cyber-js: directory traversal
An attacker can traverse directories of Node.js cyber-js, in order to read a file outside the service root path...
Joomla Realtyna RPL: SQL injection
An attacker can use a SQL injection of Joomla Realtyna RPL, in order to read or alter data...
WordPress Contact Form 7 International Sms Integration: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Contact Form 7 International Sms Integration, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 740 741 742 743 744 745 746 747 748 750 752 753 754 755 756 757 758 759 760 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1058