The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SAP NetWeaver Dispatcher: memory corruption
An attacker can generate a memory corruption of SAP NetWeaver Dispatcher, in order to trigger a denial of service, and possibly to execute code...
SAP NetWeaver Dispatcher: buffer overflow
An attacker can generate a buffer overflow of SAP NetWeaver Dispatcher, in order to trigger a denial of service, and possibly to execute code...
Cisco Unified Communications Manager: commands execution via CTIManager
An attacker can send illicit Kerberos tickets to CTIManager of Cisco Unified Communications Manager, in order to run arbitrary commands...
Cisco Unified Communications Manager: denial of service via SIP notifications
An attacker can send ill formed SIP messages to Cisco Unified Communications Manager, in order to trigger a denial of service...
Jasig CAS: access control bypass
An attacker can use several vulnerabilities of URL of Jasig CAS...
WordPress Custom Contact Forms: unprotected administration actions
An attacker can directly access to an URL of WordPress Custom Contact Forms, without any authentication order to read or change this database...
MIT krb5: NULL pointer dereference via GSSAPI
An attacker can force a NULL pointer to be dereferenced in the server process Kerberos, in order to trigger a denial of service...
Cisco Unified Communications Manager: SQL injection of Unity Connection
An attacker can use a SQL injection in Unity Connection of Cisco Unified Communications Manager, in order to read data...
Joomla Watchful Client: information disclosure
An attacker can make Joomla Watchful Client call code stored outside of the product installation tree, in order to obtain sensitive information...
Joomla Multicalendar: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Multicalendar, in order to execute JavaScript code in the context of the web site...
HP Operations: privilege escalation via Glance
An attacker can exploit HP Operations Agent with Glance, in order to escalate his privileges...
MIT krb5: buffer overflow of kadmind
An attacker can generate a buffer overflow in kadmind of MIT krb5, in order to trigger a denial of service, and possibly to execute code...
OpenBSD: denial of service via invalid DHCP options
An attacker can send DHCP packets with invalid options to an OpenBSD host, in order to trigger a denial of service...
Cisco Unified Communications Manager: hiding multiple connections
An authenticated attacker can connect to the management interface of Cisco Unified Communications Manager without being visible by other administrators...
Cisco Unity Connection: privilege escalation via the web server
An authenticated attacker can read files via the web server of Cisco Unity Connection, in order to get administrator privileges...
WordPress Simple Retail Menus: SQL injection of includes/mode-edit.php
An attacker can use a SQL injection in includes/mode-edit.php of WordPress Simple Retail Menus, in order to read or alter data...
Cisco IOS: denial of service via EnergyWise
An attacker can send EnergyWise packets to a router running Cisco IOS, in order to trigger a denial of service...
Drupal Fasttoggle: account locking via access control bypass
An attacker can bypass the access control of Drupal Fasttoggle, in order to lock user accounts...
WordPress Core: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Drupal Biblio Autocomplete: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Biblio Autocomplete...
Drupal core, WordPress core, Drupal: denial of service via xmlrpc.php
An attacker can submit XML-RPC requests, in order to read private information or trigger a denial of service...
OpenSSL: nine vulnerabilities
An attacker can use several vulnerabilities of OpenSSL...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 452 453 454 455 456 457 458 459 460 462 464 465 466 467 468 469 470 471 472 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1011