The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS: VPN traffic forwarding via Flex-VPN load-balancing
An attacker can use the Flex-VPN load-balancing feature, in order to forward a VPN traffic...
Cisco IOS: denial of service via IKEv2
An attacker can send malicious IKEv2 packets to Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via SSH
An attacker can establish an SSH Idle session to Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via authproxy
An attacker can use truncated HTTP sessions to ios-authproxy of Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via Scan Safe Tower
An attacker can send TCP SYN packets with Scan Safe Tower of Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via SSH
An attacker can use a SSH session of Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via Frame Relay
An attacker can send Frame Relay packets to Cisco IOS with VWIC2-2MFT-T1/E1 in mode TDM/HDLC, in order to trigger a denial of service...
Cisco IOS: denial of service via IPv6 MLD
An attacker can send IPv6 MLD packets to Cisco IOS on Catalyst, in order to trigger a denial of service...
Cisco IOS: denial of service via IPv6 MLD
An attacker can send IPv6 MLD packets to Cisco IOS on ASR 1000, in order to trigger a denial of service...
Cisco IOS: denial of service via Route Processor
An attacker can send numerous packets to the Route Processor of Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via IKEv2
An attacker can trigger a memory leak via IKEv2 of Cisco IOS, in order to trigger a denial of service...
Symantec Encryption Desktop: two vulnerabilities
An attacker can use several vulnerabilities of Symantec Encryption Desktop...
Drupal Professional Theme: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Professional Theme, in order to execute JavaScript code in the context of the web site...
Drupal Custom Search: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Custom Search, in order to execute JavaScript code in the context of the web site...
Drupal Internationalization: information disclosure via Path Aliases
An attacker can read Path Aliases of Drupal Internationalization, in order to obtain sensitive information...
Drupal Commons: two vulnerabilities
An attacker can use several vulnerabilities of Drupal Commons...
Xen: NULL pointer dereference via ARM GIC
An attacker can dereference a NULL pointer the ARM GIC implementation for Xen, in order to trigger a denial of service...
MHonArc: Cross Site Scripting of Commentize
An attacker can trigger a Cross Site Scripting via a comment of MHonArc, in order to execute JavaScript code in the context of the web site...
Cisco ASA: memory leak via SIP
An attacker can create a memory leak via SIP in Cisco ASA, in order to trigger a denial of service...
Linux kernel: network reconfiguration via Netlink Socket
A local attacker can use a suid root program, to write to a Netlink socket, in order to reconfigure the network of the Linux kernel...
Wireshark: denial of service via RTP
An attacker can use a special RTP session, in order to trigger a denial of service of Wireshark...
Xen: hardware access on ARM
An attacker, who is located in a guest system, can use vulnerabilities in the ARM implementation of Xen, in order to trigger a denial of service, and possibly to execute code...
IBM Domino, Notes: code execution via Linux 32 bit
An attacker can use a vulnerability of IBM Domino/Notes on Linux 32 bits, in order to execute code...
WordPress Theagency: file upload
An attacker can upload a malicious file on WordPress Theagency, in order for example to upload a Trojan...
WordPress Wp Js External: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Wp Js External, in order to execute JavaScript code in the context of the web site...
Qemu: buffer overflow of virtio_load
An attacker, who can alter virtio data, can generate a buffer overflow in the virtio_load() function of Qemu, in order to trigger a denial of service, and possibly to execute code...
HP-UX: write access with WLI
An attacker can bypass access restrictions of HP-UX Whitelisting, in order to alter data...
WordPress Cu3er Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Cu3er Slider, in order to execute JavaScript code in the context of the web site...
WordPress Gallery Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Gallery Manager, in order to execute JavaScript code in the context of the web site...
WordPress Cu3er Post Elements: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Cu3er Post Elements, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 435 436 437 438 439 440 441 442 443 445 447 448 449 450 451 452 453 454 455 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103