The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Contact Form DB: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Contact Form DB, in order to execute JavaScript code in the context of the web site...
WordPress Cart66 Lite: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Cart66 Lite, in order to execute JavaScript code in the context of the web site...
WordPress Acobot Live Chat & Contact Form: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Acobot Live Chat & Contact Form, in order to execute JavaScript code in the context of the web site...
Cisco IOS: denial of service via Zone-Based Firewall Session Objects
An attacker can send a malicious Zone-Based Firewall Session Objects packet to Cisco IOS, in order to trigger a denial of service...
Cisco IOS: denial of service via Zone-Based Firewall Kernel Timer
An attacker can send malicious data for the Zone-Based Firewall of Cisco IOS, in order to trigger a denial of service...
Apache WSS4J: two vulnerabilities
An attacker can use several vulnerabilities of Apache WSS4J...
Cisco IOS: denial of service via Shell
A local authenticated attacker can use a malicious Shell command on Cisco IOS, in order to trigger a denial of service...
Cisco Prime Security Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Security Manager, in order to execute JavaScript code in the context of the web site...
Cisco Prime Infrastructure: Cross Frame Scripting
An attacker can trigger a Cross Frame Scripting of Cisco Prime Infrastructure, in order to execute JavaScript code in the context of the web site...
Cisco Prime Infrastructure: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Prime Infrastructure, in order to force the victim to perform operations...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to execute JavaScript code in the context of the web site...
Linux kernel: denial of service via nft_flush_table
A local privileged attacker can force an error in the nft_flush_table() function of the Linux kernel, in order to trigger a denial of service...
sudo: file reading via TZ
A local privileged attacker can set the TZ environment variable before calling sudo, in order to force the opening of a file, or a denial of service if this file is blocking...
D-Bus: denial of service via ActivationFailure
A local attacker can send ActivationFailure messages to D-Bus, in order to trigger a denial of service...
hMailServer: privilege escalation
A privileged attacker can change the password of the hMailServer administrator, in order to escalate his privileges...
WordPress Users Ultra: SQL injection
An attacker can use a SQL injection of WordPress Users Ultra, in order to read or alter data...
WordPress holding_pattern: file upload
An attacker can upload a malicious file on WordPress holding_pattern, in order for example to upload a Trojan...
ArcGIS for Server: multiple vulnerabilities
An attacker can use several vulnerabilities of ArcGIS for Server...
Cisco Email Security Appliance: bypassing filtering via Uuencode
An attacker can send an email with an attachment in Uuencode format to Cisco Email Security Appliance, in order to transfer a malware which is not detected...
Cisco ASA: denial of service via WebVPN Proxy Bypass Content Rewriter
An attacker can generate an error in WebVPN Proxy Bypass Content Rewriter of Cisco ASA, in order to trigger a denial of service...
Apache Tomcat: HTTP query injection
An attacker can send a malformed Chunk query to Apache Tomcat, in order to inject a new HTTP query, for example to bypass a security policy...
Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Trend Micro AntiVirus: privilege escalation via tmeext.sys
An attacker can call an ioctl of tmeext.sys installed by Trend Micro, in order to escalate his privileges...
libvirt: password disclosure via VIR_DOMAIN_XML_SECURE
An attacker can use VIR_DOMAIN_XML_SECURE of libvirt, in order to obtain the VNC password...
OpenLDAP: use after free via Matched Values
An attacker can force the usage of a freed memory area in Matched Values of OpenLDAP, in order to trigger a denial of service, and possibly to execute code...
OpenLDAP: NULL pointer dereference via deref
An attacker can force a NULL pointer to be dereferenced in the deref overlay of OpenLDAP, in order to trigger a denial of service...
WebSphere MQ: denial of service via PCF
A privileged attacker can send a PCF message to IBM WebSphere MQ, in order to trigger a denial of service...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
PostgreSQL: multiple vulnerabilities
An attacker can use several vulnerabilities of PostgreSQL...
e2fsprogs: buffer overflow via s_first_meta_bg
An attacker can generate a buffer overflow in e2fsprogs, in order to trigger a denial of service, and possibly to execute code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 485 486 487 488 489 490 491 492 493 495 497 498 499 500 501 502 503 504 505 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103