The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 ImageMagick: NULL pointer dereference via PostscriptDelegateMessage
An attacker can force a NULL pointer to be dereferenced via PostscriptDelegateMessage() of ImageMagick, in order to trigger a denial of service...
2 WordPress Ultimate Form Builder Lite: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Ultimate Form Builder Lite...
2 OTRS Help Desk: information disclosure via Ticket Overview Screen
An attacker can bypass access restrictions to data via Ticket Overview Screen of OTRS Help Desk, in order to obtain sensitive information...
2 OpenSSL: denial of service via Large DH Parameter
An attacker can generate a fatal error via Large DH Parameter of OpenSSL, in order to trigger a denial of service...
2 Grafana: Cross Site Scripting via Dashboard
An attacker can trigger a Cross Site Scripting via Dashboard of Grafana, in order to run JavaScript code in the context of the web site...
2 Asterisk: information disclosure via PJSIP Endpoint Presence
An attacker can bypass access restrictions to data via PJSIP Endpoint Presence of Asterisk, in order to obtain sensitive information...
2 Asterisk: infinite loop via iostreams
An attacker can generate an infinite loop via iostreams of Asterisk, in order to trigger a denial of service...
1 Linux kernel: information disclosure via USB Video Class
A local attacker can read a memory fragment via USB Video Class of the Linux kernel, in order to obtain sensitive information...
2 Symfony: Cross Site Scripting via Profiler
An attacker can trigger a Cross Site Scripting via Profiler of Symfony, in order to run JavaScript code in the context of the web site...
2 Splunk: information disclosure via __raw
An authenticated attacker can use a vulnerability via __raw of Splunk, in order to obtain sensitive information...
1 Linux kernel: information disclosure via SG_IO
A local attacker can read a memory fragment via SG_IO of the Linux kernel, in order to obtain sensitive information...
2 Qt: denial of service via QXmlSimpleReader
An attacker can generate a fatal error via QXmlSimpleReader() of Qt, in order to trigger a denial of service...
2 SchedMD Slurm: privilege escalation via user_name/gid
An attacker can bypass restrictions via user_name/gid of SchedMD Slurm, in order to escalate his privileges...
2 elfutils: out-of-bounds memory reading via ebl_dynamic_tag_name
An attacker can force a read at an invalid address via ebl_dynamic_tag_name() of elfutils, in order to trigger a denial of service, or to obtain sensitive information...
2 GnuPG: creation of fake status messages
An attacker can create fake status messages in GnuPG, in order to deceive the victime...
2 Puppet: privilege escalation via PE Client Tools
An attacker can bypass restrictions via PE Client Tools of Puppet, in order to escalate his privileges...
2 Puppet Agent: privilege escalation via pxp-agent
An attacker can bypass restrictions via pxp-agent of Puppet Agent, in order to escalate his privileges...
2 Puppet Agent: privilege escalation via Shared Libraries
An attacker can bypass restrictions via Shared Libraries of Puppet Agent, in order to escalate his privileges...
2 Puppet Agent/Enterprise: privilege escalation via Shared Libraries
An attacker can bypass restrictions via Shared Libraries of Puppet Agent/Enterprise, in order to escalate his privileges...
2 Puppet Enterprise: code execution via Razor-Server
An attacker can use a vulnerability via Razor-Server of Puppet Enterprise, in order to run code...
2 Spring Integration Zip: directory traversal
An attacker can traverse directories of Spring Integration Zip, in order to create a file outside the service root path. This vulnerability is a member of the Zip Slip family (VIGILANCE-VUL-26357)...
2 Multiple products: directory traversal via Zip Slip
An attacker can traverse directories via the Zip Slip family attack, in order to write a file outside the service root path...
2 Trend Micro OfficeScan: multiple vulnerabilities
An attacker can use several vulnerabilities of Trend Micro OfficeScan...
2 Perl PGObject-Util-DBAdmin: code execution via Variable Injection
An attacker can use a vulnerability via Variable Injection of Perl PGObject::Util::DBAdmin, in order to run code...
2 WordPress Form Maker: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Form Maker...
2 WordPress Contact Form Maker: vulnerability
A vulnerability of WordPress Contact Form Maker was announced...
2 WordPress Contact Form Maker: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Contact Form Maker...
2 Perl Archive-Tar: directory traversal via Symlink
An attacker can traverse directories via Symlink of Perl Archive::Tar, in order to create a file outside the service root path...
4 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 826 827 828 829 830 831 832 833 834 836 838 839 840 841 842 843 844 845 846 861 881 901 921 941 961 981 996