The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Composer: vulnerability
A vulnerability of Composer was announced...
2 Anki: write access via Apkg Imports
An attacker can bypass access restrictions via Apkg Imports of Anki, in order to alter data...
3 OpenSLP: memory corruption via slpd_process.c
An attacker can generate a memory corruption via slpd_process.c of OpenSLP, in order to trigger a denial of service, and possibly to run code...
3 Ghostscript: integer overflow via set_text_distance
An attacker can generate an integer overflow via set_text_distance() of Ghostscript, in order to trigger a denial of service, and possibly to run code...
4 Drupal Core: code execution via Multiple Subsystems
An attacker can use a vulnerability via Multiple Subsystems of Drupal Core, in order to run code...
2 EMC VNX/Unisphere: external XML entity injection
An attacker can transmit malicious XML data to EMC VNX/Unisphere, in order to read a file, scan sites, or trigger a denial of service...
2 WordPress UK Cookie Consent: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress UK Cookie Consent, in order to run JavaScript code in the context of the web site...
2 Xen: denial of service via XPTI
An attacker, inside a guest system, can generate a fatal error via XPTI of Xen, in order to trigger a denial of service on the host system...
2 Xen: file reading via CDROM
A local attacker can read a file via CDROM of Xen, in order to obtain sensitive information...
1 Linux kernel: NULL pointer dereference via xfs_bmap_extents_to_btree
An attacker can force a NULL pointer to be dereferenced via xfs_bmap_extents_to_btree() of the Linux kernel, in order to trigger a denial of service...
1 Linux kernel: NULL pointer dereference via xfs_dinode_verify
An attacker can force a NULL pointer to be dereferenced via xfs_dinode_verify() of the Linux kernel, in order to trigger a denial of service...
1 Linux kernel: NULL pointer dereference via OOM Kill
An attacker can force a NULL pointer to be dereferenced via OOM Kill of the Linux kernel, in order to trigger a denial of service...
2 Apache ActiveMQ: denial of service via Openwire Connection Request
An attacker can generate a fatal error via Openwire Connection Request of Apache ActiveMQ, in order to trigger a denial of service...
2 OpenID4Java: read-write access via Attribute Exchange
An attacker can bypass access restrictions via Attribute Exchange of OpenID4Java, in order to read or alter data...
2 Netty: infinite loop via OpenSslEngine
An attacker can generate an infinite loop via OpenSslEngine of Netty, in order to trigger a denial of service...
2 Netty: denial of service via WebSocket08FrameDecoder
An attacker can generate a fatal error via WebSocket08FrameDecoder of Netty, in order to trigger a denial of service...
2 IBM QRadar SIEM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site...
2 IBM QRadar SIEM: directory traversal
An attacker can traverse directories of IBM QRadar SIEM, in order to read a file outside the service root path...
2 IBM QRadar SIEM: SQL injection
An attacker can use a SQL injection of IBM QRadar SIEM, in order to read or alter data...
3 IBM QRadar SIEM: code execution via Eval
An attacker can use a vulnerability via Eval of IBM QRadar SIEM, in order to run code...
3 IBM QRadar SIEM: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of IBM QRadar SIEM, in order to run code...
2 Psensor: directory traversal via create_response
An attacker can traverse directories via create_response() of Psensor, in order to read a file outside the service root path...
2 Apache Solr: external XML entity injection
An attacker can transmit malicious XML data to Apache Solr, in order to read a file, scan sites, or trigger a denial of service...
2 Apple macOS: two vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
3 Apple iOS: two vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
2 Linux kernel: integer overflow via udl_fb_mmap
An attacker can generate an integer overflow via udl_fb_mmap() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 WordPress Responsive Cookie Consent: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Responsive Cookie Consent...
2 WordPress WD Instagram Feed: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WD Instagram Feed, in order to run JavaScript code in the context of the web site...
2 WordPress Ultimate Member: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ultimate Member, in order to run JavaScript code in the context of the web site...
2 WordPress Ultimate Member: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Ultimate Member, in order to force the victim to perform operations...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 813 814 815 816 817 818 819 820 821 823 825 826 827 828 829 830 831 832 833 841 861 881 901 921 941 961 981 996