The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 ax25-tools: denial of service via ROSE
An attacker can send a malicious ROSE packet to ax25-tools, in order to trigger a denial of service...
2 PowerDNS: denial of service via Label Decompression
An attacker can generate a fatal error in Label Decompression of PowerDNS, in order to trigger a denial of service...
2 stunnel: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of stunnel, in order to trigger a denial of service...
2 Drupal Views: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Views, in order to execute JavaScript code in the context of the web site...
2 Drupal Smart Trim: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Smart Trim, in order to execute JavaScript code in the context of the web site...
2 Drupal MailChimp: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal MailChimp, in order to execute JavaScript code in the context of the web site...
2 Elasticsearch: directory traversal
An attacker can traverse directories of Elasticsearch, in order to read a file outside the service root path...
2 Icecast2: NULL pointer dereference via URL Authentication
An attacker can force a NULL pointer to be dereferenced in URL Authentication of Icecast2, in order to trigger a denial of service...
2 WordPress White Label CMS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress White Label CMS, in order to execute JavaScript code in the context of the web site...
2 Cisco ASR 5000: denial of service via IPv6
An attacker can send a malicious IPv6 packet to Cisco ASR 5000, in order to trigger a denial of service...
2 Cisco IOS XE: denial of service via RADIUS
An attacker can send a malicious RADIUS packet to Cisco IOS XE, in order to trigger a denial of service...
2 Cisco IOS XE: denial of service via DHCPv6
An attacker can send a malicious DHCPv6 packet to Cisco IOS XE, in order to trigger a denial of service...
2 APR Core: read-write access via Windows Named Pipe
A local attacker on Windows can bypass access restrictions of Named Pipe of APR Core, in order to read or alter data...
2 Puppet Enterprise: Cross Site Framing
An attacker can trigger a Cross Site Framing of Puppet Enterprise, in order to force the victim to perform operations on the web site...
2 WordPress WP Photo Album Plus: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Photo Album Plus, in order to execute JavaScript code in the context of the web site...
2 Cisco IOS XE: denial of service via OTV
An attacker can send malicious packets to Cisco IOS XE for OTV, in order to trigger a denial of service...
2 ntop: Cross Site Scripting of rrdPlugin
An attacker can trigger a Cross Site Scripting in rrdPlugin of ntop, in order to execute JavaScript code in the context of the web site...
1 T1utils: buffer overflow
An attacker can generate a buffer overflow of T1utils, in order to trigger a denial of service, and possibly to execute code...
2 MySQL: Man-in-the-Middle of TLS
An attacker can act as a Man-in-the-Middle when the MySQL client asks for a TLS session, in order to read or alter exchanged data...
2 YOURLS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of YOURLS, in order to execute JavaScript code in the context of the web site...
2 ClamAV: eight vulnerabilities
An attacker can use several vulnerabilities of ClamAV...
1 python-pillow: vulnerability of IcnsImagePlugin
A vulnerability in IcnsImagePlugin of python-pillow was announced...
1 python-pillow: vulnerability of Jpeg2KImagePlugin
A vulnerability in Jpeg2KImagePlugin of python-pillow was announced...
1 python-pillow: vulnerability of PNG
A vulnerability in PNG of python-pillow was announced...
3 WebSphere AS: code execution via Management Port
An attacker can connect to the management port of WebSphere AS, in order to execute code...
4 Chrome: five vulnerabilities
An attacker can use several vulnerabilities of Chrome...
2 cURL: headers sent to the proxy
An attacker can capture headers sent by cURL to the proxy, in order to obtain sensitive information...
2 Horde: two vulnerabilities
An attacker can use several vulnerabilities of Horde...
1 ICU: vulnerability
A vulnerability of ICU was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 506 507 508 509 510 511 512 513 514 516 518 519 520 521 522 523 524 525 526 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 994