The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Leptonica: denial of service via fscanf/sscanf
An attacker can generate a fatal error via fscanf/sscanf of Leptonica, in order to trigger a denial of service...
Joomla NeoRecruit: SQL injection
An attacker can use a SQL injection of Joomla NeoRecruit, in order to read or alter data...
Joomla Ek rishta: SQL injection
An attacker can use a SQL injection of Joomla Ek rishta, in order to read or alter data...
Joomla Alexandria Book Library: SQL injection
An attacker can use a SQL injection of Joomla Alexandria Book Library, in order to read or alter data...
OTRS Help Desk: privilege escalation via OPM
An attacker can bypass restrictions via OPM of OTRS Help Desk, in order to escalate his privileges...
Google Android/Pixel: multiple vulnerabilities of March 2018
An attacker can use several vulnerabilities of Google Android/Pixel...
Joomla SIGE: Cross Site Scripting via Image Metadata
An attacker can trigger a Cross Site Scripting via Image Metadata of Joomla SIGE, in order to run JavaScript code in the context of the web site...
Linux kernel: use after free via hns_nic_net_xmit_hw
An attacker can force the usage of a freed memory area via hns_nic_net_xmit_hw() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: NULL pointer dereference via cluster/nodemanager.c
An attacker can force a NULL pointer to be dereferenced via cluster/nodemanager.c of the Linux kernel, in order to trigger a denial of service...
IBM Pulse for QRadar: information disclosure
An attacker can bypass access restrictions to data of IBM Pulse for QRadar, in order to obtain sensitive information...
IBM Workload Scheduler: privilege escalation via SetUID/SetGID Programs
An attacker can bypass restrictions via SetUID/SetGID Programs of IBM Workload Scheduler, in order to escalate his privileges...
WordPress MainWP Child: privilege escalation
An attacker can bypass restrictions of WordPress MainWP Child, in order to escalate his privileges...
Joomla JS Autoz: SQL injection
An attacker can use a SQL injection of Joomla JS Autoz, in order to read or alter data...
F5 BIG-IP APM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of F5 BIG-IP APM, in order to run JavaScript code in the context of the web site...
WordPress iThemes Security: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress iThemes Security, in order to run JavaScript code in the context of the web site...
Linux kernel: denial of service in the CIFS trafic encryption
An attacker can generate a fatal error in setup_ntlmv2_rsp() of the Linux kernel, in order to trigger a denial of service...
Memcached: security improvement for the UDP transport
The security of Memcached was improved for UDP transport, which now defaults to disabled to limit the possibilities of DDos reflected attacks (see VIGILANCE-ACTU-5745)...
Linux kernel: denial of service via ip6t_do_table
An attacker can generate a fatal error via ip6t_do_table() of the Linux kernel, in order to trigger a denial of service...
RubyGems: multiple vulnerabilities
An attacker can use several vulnerabilities of RubyGems...
Dovecot: denial of service
An attacker can generate a fatal error of Dovecot, in order to trigger a denial of service...
Apache trafficserver: multiple vulnerabilities
An attacker can use several vulnerabilities of Apache trafficserver...
libjgraphx-java: external XML entity injection
An attacker can transmit malicious XML data to libjgraphx-java, in order to read a file, scan sites, or trigger a denial of service...
Symfony: four vulnerabilities
An attacker can use several vulnerabilities of Symfony...
WordPress File Manager: information disclosure via file-manager/log.txt
An attacker can request the file /wp-content/uploads/file-manager/log.txt which is filled with sensitive information by WordPress File Manager...
Joomla Realpin: SQL injection
An attacker can use a SQL injection of Joomla Realpin, in order to read or alter data...
simplesamlphp: two vulnerabilities
An attacker can use several vulnerabilities of simplesamlphp...
WordPress NextGEN Gallery: directory traversal
An attacker can traverse directories of WordPress NextGEN Gallery, in order to read a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 795 796 797 798 799 800 801 802 803 805 807 808 809 810 811 812 813 814 815 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050