The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Cacti: Cross Site Scripting via Name Color
An attacker can trigger a Cross Site Scripting via Name Color of Cacti, in order to run JavaScript code in the context of the web site...
2 Cacti: Cross Site Scripting via Vertical Label
An attacker can trigger a Cross Site Scripting via Vertical Label of Cacti, in order to run JavaScript code in the context of the web site...
2 Cacti: Cross Site Scripting via Website Hostname Devices
An attacker can trigger a Cross Site Scripting via Website Hostname Devices of Cacti, in order to run JavaScript code in the context of the web site...
2 Cacti: Cross Site Scripting via Website Hostname
An attacker can trigger a Cross Site Scripting via Website Hostname of Cacti, in order to run JavaScript code in the context of the web site...
2 Cacti: Cross Site Scripting via user_admin.php
An attacker can trigger a Cross Site Scripting via user_admin.php of Cacti, in order to run JavaScript code in the context of the web site...
3 rdesktop: multiple vulnerabilities
An attacker can use several vulnerabilities of rdesktop...
2 McAfee Application Control: privilege escalation via DLL/ASP.NET
An attacker can bypass restrictions via DLL/ASP.NET of McAfee Application Control, in order to escalate his privileges...
3 Terminology: code execution via Control Sequence
An attacker can use a vulnerability via Control Sequence of Terminology, in order to run code...
2 Joomla Kunena: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Kunena, in order to run JavaScript code in the context of the web site...
2 tar: infinite loop via Sparse
An attacker can trigger an infinite loop via Sparse of tar, in order to trigger a denial of service...
1 LibRaw: denial of service via identify
An attacker can trigger a fatal error via identify() of LibRaw, in order to trigger a denial of service...
1 LibRaw: denial of service via identify
An attacker can trigger a fatal error via identify() of LibRaw, in order to trigger a denial of service...
1 Linux kernel: out-of-bounds memory reading via hso_probe
An attacker can force a read at an invalid address via hso_probe() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
2 VCFtools: use after free via add_FORMAT_descriptor
An attacker can force the usage of a freed memory area via add_FORMAT_descriptor() of VCFtools, in order to trigger a denial of service, and possibly to run code...
2 VCFtools: use after free via add_INFO_descriptor
An attacker can force the usage of a freed memory area via add_INFO_descriptor() of VCFtools, in order to trigger a denial of service, and possibly to run code...
2 VCFtools: out-of-bounds memory reading via add_INFO_descriptor
An attacker can force a read at an invalid address via add_INFO_descriptor() of VCFtools, in order to trigger a denial of service, or to obtain sensitive information...
2 Electron Cash: information disclosure via Phishing
An attacker can bypass access restrictions to data via Phishing of Electron Cash, in order to obtain sensitive information...
1 Poppler: memory leak via GfxColorSpace-setDisplayProfile
An attacker can create a memory leak via GfxColorSpace::setDisplayProfile() of Poppler, in order to trigger a denial of service...
1 Leptonica: file corruption
A local attacker can create a symbolic link, in order to alter the pointed file, with privileges of Leptonica...
2 php-pear: vulnerability
A vulnerability of php-pear was announced...
2 LibRaw: four vulnerabilities
An attacker can use several vulnerabilities of LibRaw...
2 c3p0: external XML entity injection
An attacker can transmit malicious XML data to c3p0, in order to read a file, scan sites, or trigger a denial of service...
2 Node.js rails-session-decoder: information disclosure via Unchecked Cookies MAC
An attacker can bypass access restrictions to data via Unchecked Cookies MAC of Node.js rails-session-decoder, in order to obtain sensitive information...
1 Linux kernel: information disclosure via SIOCFINDIPDDPRT
A local attacker can read a memory fragment via SIOCFINDIPDDPRT of the Linux kernel, in order to obtain sensitive information...
2 F5 BIG-IP AFM: privilege escalation via DNS Query Label Length Not Classified
An attacker can bypass restrictions via DNS Query Label Length Not Classified of F5 BIG-IP AFM, in order to escalate his privileges...
2 F5 BIG-IP APM: Cross Site Request Forgery via Webtop Re-authentication
An attacker can trigger a Cross Site Request Forgery via Webtop Re-authentication of F5 BIG-IP APM, in order to force the victim to perform operations...
1 F5 BIG-IP: information disclosure via Snapshot File Access
An attacker can bypass access restrictions to data via Snapshot File Access of F5 BIG-IP, in order to obtain sensitive information...
2 F5 BIG-IP APM: information disclosure via Back-end Servers Host Name
An attacker can bypass access restrictions to data via Back-end Servers Host Name of F5 BIG-IP APM, in order to obtain sensitive information...
3 F5 BIG-IP LTM: denial of service via BGP Eight ASN
An attacker can trigger a fatal error via BGP Eight ASN of F5 BIG-IP, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 885 886 887 888 889 890 891 892 893 895 897 898 899 900 901 902 903 904 905 921 941 961 981 996