The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
Xen: denial of service via HVMOP_set_mem_type
An attacker, located in a guest HVM system with qemu-dm, can call HVMOP_set_mem_type of Xen, in order to trigger a denial of service...
Cisco ASA: denial of service via DHCPv6
An attacker can send a special DHCPv6 packet to Cisco ASA with DHCPv6 Replay enabled, in order to trigger a denial of service...
Cisco IOS XE: denial of service via L2TP
An attacker can send a malicious L2TP packet to Cisco IOS XE, in order to trigger a denial of service...
Cisco Unified Communications Manager: information disclosure via CDR Management
An attacker can use CDR Management of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Unified Communications Manager: information disclosure via IPMA
An attacker can send a special query to IPMA (Cisco IP Manager Assistant) of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Unified Contact Center Express: file upload
An attacker can upload a malicious file on Cisco Unified Contact Center Express, in order for example to upload a Trojan...
super: privilege escalation via setuid
A local attacker can use the super program, in order to read files with elevated privileges...
Adobe Flash Player: buffer overflow
An attacker can generate a buffer overflow of Adobe Flash Player, in order to trigger a denial of service, and possibly to execute code...
WordPress Echelon: file upload
An attacker can upload a malicious file on WordPress Echelon, in order for example to upload a Trojan...
Qt: NULL pointer dereference via QtGui GIF
An attacker can create a malicious GIF image, to dereference a NULL pointer in QtGui of Qt, in order to trigger a denial of service...
WordPress NextCellent Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress NextCellent Gallery, in order to execute JavaScript code in the context of the web site...
WordPress Webfolio: Cross Site Scripting of CU3ER
An attacker can trigger a Cross Site Scripting in CU3ER of WordPress Webfolio, in order to execute JavaScript code in the context of the web site...
WordPress Elite Force: Cross Site Scripting of CU3ER
An attacker can trigger a Cross Site Scripting in CU3ER of WordPress Elite Force, in order to execute JavaScript code in the context of the web site...
WordPress Themebox: Cross Site Scripting of CU3ER
An attacker can trigger a Cross Site Scripting in CU3ER of WordPress Themebox, in order to execute JavaScript code in the context of the web site...
WordPress Los Angeles: Cross Site Scripting of CU3ER
An attacker can trigger a Cross Site Scripting in CU3ER of WordPress Los Angeles, in order to execute JavaScript code in the context of the web site...
WordPress ShapeShifter: Cross Site Scripting of CU3ER
An attacker can trigger a Cross Site Scripting in CU3ER of WordPress ShapeShifter, in order to execute JavaScript code in the context of the web site...
Internet Explorer: use after free in VGX.DLL
An attacker can use a freed memory area in VGX.DLL of Internet Explorer, in order to trigger a denial of service, and possibly to execute code...
WordPress Work-The-Flow: file upload
An attacker can upload a malicious file on WordPress Work-The-Flow, in order for example to upload a Trojan...
Drupal Videowhisper: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Videowhisper, in order to execute JavaScript code in the context of the web site...
Cisco ASR 1000: denial of service via BDI Routing ICMP
An attacker can send a broadcast/multicast fragmented ICMP packet to Cisco ASR 1000 with BDI Routing, in order to trigger a denial of service...
Cisco IOS: bypassing ACL via IPv6
An attacker can send IPv6 packets to Cisco IOS, in order to bypass Drop ACLs...
WordPress iMember360: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress iMember360...
SIMATIC S7-1200: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC S7-1200...
Cisco IOS: denial of service via RTCP
An attacker can send malicious RTCP packets to Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via AS5400
An attacker can generate an error of Cisco IOS on AS5400, in order to trigger a denial of service...
Cisco IOS: denial of service via VoIP
An attacker can send malicious VoIP data to Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via BGP Path Attributes
An attacker can send malicious BGP Path Attributes to Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via object-group
A local attacker can edit object-groups of Cisco IOS, in order to trigger a denial of service...
Cisco IOS: memory leak via VTY
An authenticated attacker can use VTY sessions, to create a memory leak in Cisco IOS, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 436 437 438 439 440 441 442 443 444 446 448 449 450 451 452 453 454 455 456 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1116