The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 WordPress YOP Poll: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress YOP Poll, in order to execute JavaScript code in the context of the web site...
3 Joomla BT Portfolio: file upload
An attacker can upload a malicious file on Joomla BT Portfolio, in order for example to upload a Trojan...
3 Joomla AdsManager: file upload
An attacker can upload a malicious file on Joomla AdsManager, in order for example to upload a Trojan...
2 Juniper Junos: denial of service via SRX nsd
An attacker can send malicious DNS data to the nsd daemon of Juniper Junos on SRX, in order to trigger a denial of service...
2 FreeIPA: multiple vulnerabilities
An attacker can use several vulnerabilities of FreeIPA...
2 Splunk: two vulnerabilities
An attacker can use several vulnerabilities of Splunk...
2 Cisco ASR: execution of shell command at boot time
An attacker can reboot a Cisco ASR router, in order to make it run an arbitrary shell script...
2 PHP: six vulnerabilities
An attacker can use several vulnerabilities of PHP...
3 Juniper JunOS: denial of service against bfdd
An attacker can send a malicious bfdd packet to Juniper JunOS, in order to trigger a denial of service...
2 VMware Workstation and Player on MS-Windows: privilege escalation via missing ACLs
An attacker can make profit of the miss of ACL in VMware Workstation, in order to escalate his privileges...
2 WordPress ibs-Mappro: directory traversal of download.php
An attacker can traverse directories in download.php of WordPress ibs-Mappro, in order to read a file outside the service root path...
3 OpenSSL: X.509 certification chain forgery
An attacker can force OpenSSL to accept spoofed certificates, in order to listen for encrypted communications or bypass signature based authentication...
2 Django: two vulnerabilities
An attacker can use several vulnerabilities of Django...
2 Juniper JunOS: NULL pointer dereference via RPD
An attacker can force a NULL pointer to be dereferenced in RPD of Juniper JunOS, in order to trigger a denial of service...
3 BSD, Juniper JunOS: memory leak in the LAST_ACK TCP state
An attacker can block numerous TCP sessions in the LAST_ACK state, to trigger a memory exhaustion in FreeBSD/OpenBSD/JunOS, in order to create a denial of service...
2 Juniper JunOS: Cross Site Scripting of J-Web
An attacker can exploit the error handling procedure of J-Web of Juniper JunOS, in order to execute JavaScript code in the context of the web site or to trigger a denial of service...
3 Drupal Administration Views: information disclosure
An unauthenticated attacker can access to Drupal Administration Views, in order to view private pages...
4 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
3 WordPress ACF Frontend display: file upload
An attacker can upload a malicious file on WordPress ACF Frontend display, in order for example to upload a Trojan...
3 Merethis Centreon: two vulnerabilities
An attacker can use several vulnerabilities of Merethis Centreon...
2 WordPress S3Bubble Amazon S3 Video And Audio Streaming With Analytics: directory traversal of "ultimate/content/downloader.php"
An attacker can traverse directories in "ultimate/content/downloader.php" of WordPress S3Bubble Amazon S3 Video And Audio Streaming With Analytics, in order to read a file outside the service root path...
2 Cisco Adaptive Security Appliance: denial of service via OSPFv2
An attacker can send a specially crafted OSPFv2 packet to a device running Cisco Adaptive Security Appliance Software, in order to trigger a denial of service...
2 Cisco IP Communicator: denial of service against the Web interface
An attacker can request a special URL to the Web interface of Cisco IP Communicator, in order to trigger a denial of service...
2 Cisco IOS XE: denial of service via PPPoE
An attacker can send a malicious PPPoE packet to a router running Cisco IOS XE, in order to trigger a denial of service...
4 Adobe Flash Player: use after free in the ByteArray class
An attacker can force the usage of a freed memory area in the class ByteArray of ActionScript for Adobe Flash Player, in order to trigger a denial of service, and possibly to execute code...
1 NTP.org: denial of service via a nul byte in the configuration
An attacker can send a configuration packet including nul bytes to the server from NTP.org, in order to trigger a denial of service...
4 ISC Bind: denial of service via DNSCEC validation
An attacker can force an assertion error in the DNSSEC validation of ISC Bind, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 525 526 527 528 529 530 531 532 533 535 537 538 539 540 541 542 543 544 545 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996