The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PostgreSQL: multiple vulnerabilities
An attacker can use several vulnerabilities of PostgreSQL...
Linux kernel: information disclosure via NFS Write Delegation
A local attacker can edit a file on NFS with Write Delegation, in order to obtain sensitive information coming from the Linux kernel memory...
ICONICS GENESIS32: code execution via IcoLaunch.dll
An attacker can invite the victim to display an HTML page calling IcoLaunch.dll of ICONICS GENESIS32, in order to execute code on his computer...
Drupal Maestro: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Maestro, in order to execute JavaScript code in the context of the web site...
Drupal Slickgrid: nodes edition
An attacker can bypass access restrictions of Drupal Slickgrid, in order to alter node values...
Cisco Unified SIP Phone 3905: code execution via 7870/tcp
An attacker can connect to the 7870/tcp port of Cisco Unified SIP Phone 3905, in order to execute privileged code...
Cisco IPS: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco IPS...
Cisco FWSM: denial of service via cut-through proxy
An unauthenticated attacker can use the cut-through proxy feature of Cisco FWSM, in order to trigger a denial of service...
Cisco Unified Communications Manager: Cross Site Request Forgery of CAR
An attacker can trigger a Cross Site Request Forgery in CAR of Cisco Unified Communications Manager, in order to force the victim to perform operations...
Cisco Unified Communications Manager: Cross Site Scripting of IPMA
An attacker can trigger a Cross Site Scripting in IPMA of Cisco Unified Communications Manager, in order to execute JavaScript code in the context of the web site...
Cisco Unified Communications Manager: SQL injection of CAPF
An attacker can use a SQL injection in CAPF of Cisco Unified Communications Manager, in order to read or alter data...
Cisco Unified Communications Manager: information disclosure via Enterprise License Manager
An attacker can read files of Enterprise License Manager of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Unified Communications Manager: information disclosure via Real Time Monitoring Tool
An attacker can use Real Time Monitoring Tool of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Unified Communications Manager: information disclosure via Java Class
An attacker can read Java Class files of Cisco Unified Communications Manager, in order to obtain sensitive information...
WordPress NextGEN Gallery: directory traversal
An attacker can traverse directories of WordPress NextGEN Gallery, in order to read a file outside the service root path...
WordPress BP Group Documents: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress BP Group Documents...
RuggedCom ROS: denial of service via SNMP
An authenticated attacker can send a SNMP packet to RuggedCom ROS, in order to trigger a denial of service...
Cisco ESA, SMA: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco ESA or SMA, in order to execute JavaScript code in the context of the web site...
Joomla com_wire_immogest: SQL injection
An attacker can use a SQL injection of Joomla com_wire_immogest, in order to read or alter data...
Openswan: NULL pointer dereference via IKEv2
An attacker can dereference a NULL pointer via IKEv2 in Openswan, in order to trigger a denial of service...
phpMyAdmin: Cross Site Scripting of import.php
An attacker can trigger a Cross Site Scripting in import.php of phpMyAdmin, in order to execute JavaScript code in the context of the web site...
WordPress WP-Password: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP-Password, in order to execute JavaScript code in the context of the web site...
WordPress Better WP Security: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Better WP Security...
WordPress Acunetix WP Security: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery in WordPress Acunetix WP Security, in order to force the victim to perform operations...
Linux kernel: memory corruption via cifs_iovec_write
A local attacker can generate a memory corruption in the cifs_iovec_write() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code...
FreeRADIUS: buffer overflow of RLM-PAP
An attacker can generate a buffer overflow in RLM-PAP of FreeRADIUS, in order to trigger a denial of service, and possibly to execute code...
Internet Explorer: use after free via CMarkup
An attacker can use a freed memory area in MSHTML CMarkup of Internet Explorer, in order to trigger a denial of service, and possibly to execute code...
SAP: multiple vulnerabilities for February 2014
An attacker can use several vulnerabilities of SAP...
SAP: code execution via AS Java
An attacker can use AS Java of SAP, in order to execute code...
SAP: code execution via CTC
An attacker can use the CTC servlet of SAP, in order to execute code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 423 424 425 426 427 428 429 430 431 433 435 436 437 438 439 440 441 442 443 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104