The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 Xen: unreachable memory reading via evtchn_fifo_set_pending
An attacker can force a read at an invalid address in the evtchn_fifo_set_pending() function of Xen, in order to trigger a denial of service...
2 SAP BusinessObjects: privilege escalation via CORBA
A remote authenticated attacker can use CORBA of SAP BusinessObjects, in order to escalate his privileges...
2 Squid: buffer overflow of SNMP
An attacker can generate a buffer overflow in the SNMP service of Squid, in order to trigger a denial of service, and possibly to execute code...
2 Squid: denial of service via pinger
An attacker can send a malicious ICMPv6 packet to the pinger of Squid, in order to trigger a denial of service...
2 WebSphere Application Server Integrated Solutions Console: Cross Site Scripting of Username
An attacker can trigger a Cross Site Scripting in Username of WebSphere Application Server Integrated Solutions Console, in order to execute JavaScript code in the context of the web site...
2 WordPress Login With Ajax: privilege escalation
An attacker can register on WordPress Login With Ajax, in order to escalate his privileges...
2 WordPress urban city: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress urban city, in order to read a file outside the service root path...
2 WordPress Spider Facebook: SQL injection
An attacker can use a SQL injection of WordPress Spider Facebook, in order to read or alter data...
2 WordPress Bulk Delete Users by Email: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Bulk Delete Users by Email, in order to force the victim to perform operations...
2 WordPress Authentic: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress Authentic, in order to read a file outside the service root path...
2 WordPress Antioch: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress Antioch, in order to read a file outside the service root path...
1 NetBSD: memory leak via setsockopt
An attacker can create a memory leak via setsockopt() on NetBSD, in order to trigger a denial of service...
2 Joomla Spider Calendar: SQL injection
An attacker can use a SQL injection of Joomla Spider Calendar, in order to read or alter data...
2 WordPress epic: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress epic, in order to read a file outside the service root path...
1 Qemu: information disclosure via VGA Emulator
A local attacker can read a memory fragment of VGA Emulator of Qemu, in order to obtain sensitive information...
2 WordPress Like Dislike Counter: SQL injection
An attacker can use a SQL injection of WordPress Like Dislike Counter, in order to read or alter data...
2 WordPress acento: directory traversal of view-pdf.php
An attacker can traverse directories in view-pdf.php of WordPress acento, in order to read a file outside the service root path...
2 WordPress FR0_theme: directory traversal of down.php
An attacker can traverse directories in down.php of WordPress FR0_theme, in order to read a file outside the service root path...
2 WordPress lote27: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress lote27, in order to read a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 457 458 459 460 461 462 463 464 465 467 469 470 471 472 473 474 475 476 477 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 995