The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Django: Cross Site Scripting via AdminURLFieldWidget
An attacker can trigger a Cross Site Scripting via AdminURLFieldWidget of Django, in order to run JavaScript code in the context of the web site...
2 FortiOS/FortiManager VM: privilege escalation via Image File System Integrity
An attacker can bypass restrictions via Image File System Integrity of FortiOS/FortiManager VM, in order to escalate his privileges...
3 FortiOS: buffer overflow via Web Portal POST Message
An attacker can trigger a buffer overflow via Web Portal POST Message of FortiOS, in order to trigger a denial of service, and possibly to run code...
2 Windows 10/2019: privilege escalation via Locked RDP Network Level Authentication
An attacker can bypass restrictions via Locked RDP Network Level Authentication of Windows 10/2019, in order to escalate his privileges...
2 phpMyAdmin: Cross Site Request Forgery via Login Form
An attacker can trigger a Cross Site Request Forgery via Login Form of phpMyAdmin, in order to force the victim to perform operations...
2 phpMyAdmin: SQL injection via Designer
An attacker can use a SQL injection via Designer of phpMyAdmin, in order to read or alter data...
4 Exim: command execution via deliver.c
An attacker can use a vulnerability of Exim, in order to run shell commands...
4 Node.js: malicious packages
These packages include malicious code this is run with administration privileges at install time...
4 Google Android: multiple vulnerabilities of June 2019
An attacker can use several vulnerabilities of Google Android...
2 GraphicsMagick: memory corruption via PCL Decoding
An attacker can trigger a memory corruption via PCL Decoding of GraphicsMagick, in order to trigger a denial of service, and possibly to run code...
1 OTRS Help Desk: information disclosure via the search function
An attacker can bypass access restrictions to data via the search function of OTRS Help Desk, in order to obtain sensitive information...
1 Linux kernel: NULL pointer dereference via get_vdev_port_node_info
An attacker can force a NULL pointer to be dereferenced via get_vdev_port_node_info() of the Linux kernel, in order to trigger a denial of service...
2 Heimdal: Man-in-the-Middle via krb5_init_creds_step
An attacker can act as a Man-in-the-Middle via krb5_init_creds_step() on Heimdal, in order to read or write data in the session...
1 Linux kernel: NULL pointer dereference via dlpar_parse_cc_property
An attacker can force a NULL pointer to be dereferenced via dlpar_parse_cc_property() of the Linux kernel, in order to trigger a denial of service...
3 WordPress WP Live Chat Support Pro: file upload
An attacker can upload a malicious file on WordPress WP Live Chat Support Pro, in order for example to upload a Trojan...
4 WordPress Convert Plus: privilege escalation via Administrator Creation
An attacker can bypass restrictions via Administrator Creation of WordPress Convert Plus, in order to escalate his privileges...
3 WordPress Zoho SalesIQ: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Zoho SalesIQ...
3 Node.js modules: multiple vulnerabilities via Malicious Code/Name
An attacker can use several vulnerabilities via Malicious Code/Name of Node.js modules...
2 Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
2 Linux kernel: use after free via _ctl_ioctl_main
An attacker can force the usage of a freed memory area via _ctl_ioctl_main() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 SQLite: out-of-bounds memory reading via rtreenode
An attacker can force a read at an invalid address via rtreenode() of SQLite, in order to trigger a denial of service, or to obtain sensitive information...
1 Linux kernel: out-of-bounds memory reading via wcd9335_codec_enable_dec
An attacker can force a read at an invalid address via wcd9335_codec_enable_dec() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
2 WordPress Statistics: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Statistics, in order to run JavaScript code in the context of the web site...
2 OTRS Help Desk: information disclosure via External Notes
An attacker can bypass access restrictions to data via External Notes of OTRS Help Desk, in order to obtain sensitive information...
2 OTRS Help Desk: information disclosure via Quoted Email
An attacker can bypass access restrictions to data via Quoted Email of OTRS Help Desk, in order to obtain sensitive information...
1 Linux kernel: NULL pointer dereference via nfsd4_verify_copy
An attacker can force a NULL pointer to be dereferenced via nfsd4_verify_copy() of the Linux kernel, in order to trigger a denial of service...
2 Kubernetes kubelet: privilege escalation via Root Uid Container
An attacker can bypass restrictions via Root Uid Container of Kubernetes kubelet, in order to escalate his privileges...
2 Intel i915 Graphics for Linux: privilege escalation
An attacker can bypass restrictions of Intel i915 Graphics for Linux, in order to escalate his privileges...
2 WordPress Hustle: code execution via CSV data file
An attacker can use a vulnerability via CSV data of WordPress Hustle, in order to run code...
2 Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 929 930 931 932 933 934 935 936 937 939 941 942 943 944 945 946 947 948 949 961 981 995