History of vulnerabilities analyzed by Vigil@nce: PostgreSQL: multiple vulnerabilities An attacker can use several vulnerabilities of PostgreSQL... Linux kernel: information disclosure via NFS Write Delegation A local attacker can edit a file on NFS with Write Delegation, in order to obtain sensitive information coming from the Linux kernel memory... ICONICS GENESIS32: code execution via IcoLaunch.dll An attacker can invite the victim to display an HTML page calling IcoLaunch.dll of ICONICS GENESIS32, in order to execute code on his computer... Drupal Maestro: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal Maestro, in order to execute JavaScript code in the context of the web site... Drupal Slickgrid: nodes edition An attacker can bypass access restrictions of Drupal Slickgrid, in order to alter node values... Cisco Unified SIP Phone 3905: code execution via 7870/tcp An attacker can connect to the 7870/tcp port of Cisco Unified SIP Phone 3905, in order to execute privileged code... Cisco IPS: multiple vulnerabilities An attacker can use several vulnerabilities of Cisco IPS... Cisco FWSM: denial of service via cut-through proxy An unauthenticated attacker can use the cut-through proxy feature of Cisco FWSM, in order to trigger a denial of service... Cisco Unified Communications Manager: Cross Site Request Forgery of CAR An attacker can trigger a Cross Site Request Forgery in CAR of Cisco Unified Communications Manager, in order to force the victim to perform operations... Cisco Unified Communications Manager: Cross Site Scripting of IPMA An attacker can trigger a Cross Site Scripting in IPMA of Cisco Unified Communications Manager, in order to execute JavaScript code in the context of the web site... Cisco Unified Communications Manager: SQL injection of CAPF An attacker can use a SQL injection in CAPF of Cisco Unified Communications Manager, in order to read or alter data... Cisco Unified Communications Manager: information disclosure via Enterprise License Manager An attacker can read files of Enterprise License Manager of Cisco Unified Communications Manager, in order to obtain sensitive information... Cisco Unified Communications Manager: information disclosure via Real Time Monitoring Tool An attacker can use Real Time Monitoring Tool of Cisco Unified Communications Manager, in order to obtain sensitive information... Cisco Unified Communications Manager: information disclosure via Java Class An attacker can read Java Class files of Cisco Unified Communications Manager, in order to obtain sensitive information... WordPress NextGEN Gallery: directory traversal An attacker can traverse directories of WordPress NextGEN Gallery, in order to read a file outside the service root path... WordPress BP Group Documents: multiple vulnerabilities An attacker can use several vulnerabilities of WordPress BP Group Documents... RuggedCom ROS: denial of service via SNMP An authenticated attacker can send a SNMP packet to RuggedCom ROS, in order to trigger a denial of service... Cisco ESA, SMA: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Cisco ESA or SMA, in order to execute JavaScript code in the context of the web site... Joomla com_wire_immogest: SQL injection An attacker can use a SQL injection of Joomla com_wire_immogest, in order to read or alter data... Openswan: NULL pointer dereference via IKEv2 An attacker can dereference a NULL pointer via IKEv2 in Openswan, in order to trigger a denial of service... phpMyAdmin: Cross Site Scripting of import.php An attacker can trigger a Cross Site Scripting in import.php of phpMyAdmin, in order to execute JavaScript code in the context of the web site... WordPress WP-Password: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress WP-Password, in order to execute JavaScript code in the context of the web site... WordPress Better WP Security: two vulnerabilities An attacker can use several vulnerabilities of WordPress Better WP Security... WordPress Acunetix WP Security: Cross Site Request Forgery An attacker can trigger a Cross Site Request Forgery in WordPress Acunetix WP Security, in order to force the victim to perform operations... Linux kernel: memory corruption via cifs_iovec_write A local attacker can generate a memory corruption in the cifs_iovec_write() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code... FreeRADIUS: buffer overflow of RLM-PAP An attacker can generate a buffer overflow in RLM-PAP of FreeRADIUS, in order to trigger a denial of service, and possibly to execute code... Internet Explorer: use after free via CMarkup An attacker can use a freed memory area in MSHTML CMarkup of Internet Explorer, in order to trigger a denial of service, and possibly to execute code... SAP: multiple vulnerabilities for February 2014 An attacker can use several vulnerabilities of SAP... SAP: code execution via AS Java An attacker can use AS Java of SAP, in order to execute code... SAP: code execution via CTC An attacker can use the CTC servlet of SAP, in order to execute code... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104