The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Skype Status: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Skype Status, in order to run JavaScript code in the context of the web site...
Drupal Page Access: vulnerability
A vulnerability of Drupal Page Access was announced...
Linux kernel: privilege escalation via driver_override
An attacker can bypass restrictions via driver_override() of the Linux kernel, in order to escalate his privileges...
WordPress WP Like Post: SQL injection
An attacker can use a SQL injection of WordPress WP Like Post, in order to read or alter data...
WordPress SQL Shortcode: SQL injection
An attacker can use a SQL injection of WordPress SQL Shortcode, in order to read or alter data...
WordPress Core: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Apache Tomcat: code execution via Read-write Default/WebDAV Servlet
An attacker can use a vulnerability via Read-write Default/WebDAV Servlet of Apache Tomcat, in order to run code...
Samba: information disclosure via Share Write Access
A local attacker can read a memory fragment via Share Write Access of Samba, in order to obtain sensitive information...
Samba: information disclosure via SMB3 DFS Redirects
An attacker can bypass access restrictions to data via SMB3 DFS Redirects of Samba, in order to obtain sensitive information...
Samba: information disclosure via Missing Signature
An attacker can bypass access restrictions to data via Missing Signature of Samba, in order to obtain sensitive information...
OTRS Help Desk: privilege escalation via Statistics Write Permissions
An attacker can bypass restrictions via Statistics Write Permissions of OTRS Help Desk, in order to escalate his privileges...
ImageMagick: denial of service via DDS
An attacker can generate a fatal error via DDS of ImageMagick, in order to trigger a denial of service...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
Asterisk: information disclosure via RTCP
An attacker can bypass access restrictions to data via RTCP of Asterisk, in order to obtain sensitive information...
Joomla Core: two vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Joomla UserExtranet: SQL injection
An attacker can use a SQL injection of Joomla UserExtranet, in order to read or alter data...
WordPress SmokeSignal: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress SmokeSignal, in order to run JavaScript code in the context of the web site...
Apache Tomcat: code execution via HTTP PUT JSP File
An attacker can use a vulnerability via HTTP PUT JSP File of Apache Tomcat, in order to run code...
Apache Tomcat: information disclosure via VirtualDirContext JSP Source Code
An attacker can bypass access restrictions to data via VirtualDirContext of Apache Tomcat, in order to obtain sensitive information...
XnView: three vulnerabilities
An attacker can use several vulnerabilities of XnView...
Linux kernel: privilege escalation via ring_buffer_resize
An attacker can bypass restrictions via ring_buffer_resize() of the Linux kernel, in order to escalate his privileges...
GDK-PixBuf: denial of service via Error Message
An attacker can generate a fatal error via Error Message of GDK-PixBuf, in order to trigger a denial of service...
Ruby: information disclosure via sprintf
A local attacker can read a memory fragment via sprintf() of Ruby, in order to obtain sensitive information...
Python: three vulnerabilities
An attacker can use several vulnerabilities of Python...
AIX Java: privilege escalation via installp/updatep
An attacker can bypass restrictions via installp/updatep of AIX Java, in order to escalate his privileges...
newsbeuter: code execution via Media Enclosure
An attacker can use a vulnerability via Media Enclosure of newsbeuter, in order to run code...
Apache httpd: information disclosure via htaccess Limit Optionsbleed
When Apache httpd hosts an .htaccess file with the Limit option, an OPTIONS query can retrieve an extract of the service memory...
SugarCRM: three vulnerabilities
An attacker can use several vulnerabilities of SugarCRM...
Linux kernel: denial of service via iscsi_if_rx
An attacker can generate a fatal error via iscsi_if_rx() of the Linux kernel, in order to trigger a denial of service...
Linux kernel: memory corruption via tpacket_rcv
An attacker can generate a memory corruption via tpacket_rcv() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 743 744 745 746 747 748 749 750 751 753 755 756 757 758 759 760 761 762 763 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050