The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Crony Cronjob Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Crony Cronjob Manager, in order to run JavaScript code in the context of the web site...
Linux kernel: assertion error via KVM Posted Interrupts
An attacker, inside a guest system, can force an assertion error via KVM Posted Interrupts of the Linux kernel, in order to trigger a denial of service on the host system...
FlightGear: write access via FGLogger
An attacker can bypass access restrictions via FGLogger of FlightGear, in order to alter data...
Linux kernel: denial of service via kvm/vmx.c
An attacker, inside a guest system, can generate a fatal error via kvm/vmx.c of the Linux kernel, in order to trigger a denial of service on the host system...
GDM: privilege escalation via Autologin
An attacker can bypass restrictions via Autologin of GDM, in order to escalate his privileges...
Cyrus IMAP: out-of-bounds memory reading via mboxlist_do_find
An attacker can force a read at an invalid address via mboxlist_do_find() of Cyrus IMAP, in order to trigger a denial of service, or to obtain sensitive information...
LibRaw: denial of service via kodak_radc_load_raw
An attacker can generate a fatal error via kodak_radc_load_raw() of LibRaw, in order to trigger a denial of service...
F5 BIG-IP: denial of service via SSL Forward Proxy
An attacker can generate a fatal error via SSL Forward Proxy of F5 BIG-IP, in order to trigger a denial of service...
FFmpeg: three vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
FFmpeg: three vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
FFmpeg: six vulnerabilities
An attacker can use several vulnerabilities of FFmpeg...
FreeXL: two vulnerabilities
An attacker can use several vulnerabilities of FreeXL...
WordPress Add Edit Delete Listing For Member Module: SQL injection
An attacker can use a SQL injection of WordPress Add Edit Delete Listing For Member Module, in order to read or alter data...
VMware vCenter Server: Cross Site Scripting via H5 Client
An attacker can trigger a Cross Site Scripting via H5 Client of VMware vCenter Server, in order to run JavaScript code in the context of the web site...
VMware ESXi/Workstation: denial of service via Guest RPC
An attacker can generate a fatal error via Guest RPC of VMware ESXi/Workstation, in order to trigger a denial of service...
VMware ESXi/Workstation: memory corruption via SVGA
An attacker, inside a guest system, can generate a memory corruption via SVGA of VMware ESXi/Workstation, in order to trigger a denial of service, and possibly to run code on the host system...
Magento: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento...
Django: Cross Site Scripting via Traceback
An attacker can trigger a Cross Site Scripting via Traceback of Django, in order to run JavaScript code in the context of the web site...
Joomla Joomanager: vulnerability
A vulnerability of Joomla Joomanager was announced...
JBoss RESTEasy: vulnerability via HTTP Vary Header
A vulnerability via HTTP Vary Header of JBoss RESTEasy was announced...
Drupal Flag Clear: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Flag Clear, in order to force the victim to perform operations...
Linux kernel: NULL pointer dereference via nl80211_set_rekey_data
An attacker can force a NULL pointer to be dereferenced via nl80211_set_rekey_data() of the Linux kernel, in order to trigger a denial of service...
Node.js content: denial of service via Regular Expression
An attacker can generate a fatal error via Regular Expression of Node.js content, in order to trigger a denial of service...
Linux kernel: denial of service via XFS
An attacker can generate a fatal error via XFS of the Linux kernel, in order to trigger a denial of service...
IBM InfoSphere DataStage: information disclosure via Access Credentials
An attacker can bypass access restrictions to data via Access Credentials of IBM InfoSphere DataStage, in order to obtain sensitive information...
IBM InfoSphere DataStage: privilege escalation
An attacker can bypass restrictions of IBM InfoSphere DataStage, in order to escalate his privileges...
IBM InfoSphere DataStage: external XML entity injection
An attacker can transmit malicious XML data to IBM InfoSphere DataStage, in order to read a file, scan sites, or trigger a denial of service...
IBM InfoSphere DataStage: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on IBM InfoSphere DataStage, in order to read or write data in the session...
Microsoft Exchange Server: vulnerabilities of September 2017
An attacker can use several vulnerabilities of Microsoft products...
Linux kernel: buffer overflow via L2CAP
An attacker can generate a buffer overflow via L2CAP of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 742 743 744 745 746 747 748 749 750 752 754 755 756 757 758 759 760 761 762 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090