The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Unified Communications Manager: denial of service via Tomcat Throttling
An attacker can open numerous sessions to Cisco Unified Communications Manager, in order to trigger a denial of service...
Junos: privilege escalation via Console Insecure
An attacker located on the console can use the Console Insecure feature of Junos, in order to escalate his privileges...
Cisco AsyncOS: denial of service via SSH
An attacker can send a malicious SSH packet to Cisco AsyncOS, in order to trigger a denial of service...
WordPress WP Attachment Export: directory traversal
An attacker can traverse directories of WordPress WP Attachment Export, in order to read a file outside the service root path...
WordPress BuddyPress Activity Plus: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress BuddyPress Activity Plus, in order to force the victim to perform operations...
WordPress Subscribe to Comments: directory traversal
An attacker can traverse directories of WordPress Subscribe to Comments, in order to read a file outside the service root path...
WordPress Plotly: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Plotly, in order to run JavaScript code in the context of the web site...
WordPress Eventbrite Tickets: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Eventbrite Tickets, in order to run JavaScript code in the context of the web site...
Panda AV/IS: memory corruption via PSKMAD.sys
A local attacker can generate a memory corruption in PSKMAD.sys of Panda AV/IS, in order to trigger a denial of service, and possibly to run code with system privileges...
WordPress recent-backups: directory traversal
An attacker can traverse directories of WordPress recent-backups, in order to read a file outside the service root path...
SQLite: memory corruption via skip-scan
An attacker can generate a memory corruption in skip-scan of SQLite, in order to trigger a denial of service, and possibly to run code...
Ansible: jail escape via symlink
A local attacker can use a symbolic link in Ansible, in order to escape from a jailed environment...
WordPress image-export: directory traversal
An attacker can traverse directories of WordPress image-export, in order to read a file outside the service root path...
libunwind: buffer overflow of dwarf_to_unw_regnum
An attacker can generate a buffer overflow in dwarf_to_unw_regnum of libunwind, in order to trigger a denial of service, and possibly to run code...
cups-filters: code execution via remove_bad_chars
An attacker can use a vulnerability in remove_bad_chars of cups-filters, in order to run code...
RoundCube Webmail: buffer overflow of DBMail
An attacker can generate a buffer overflow in DBMail of RoundCube Webmail, in order to trigger a denial of service, and possibly to run code...
roundcubemail: code execution via DBMail
An attacker can use a vulnerability in DBMail of roundcubemail, in order to run code...
Moped: denial of service via ObjectId
An attacker can generate a fatal error in ObjectId of Moped, in order to trigger a denial of service...
PCRE: buffer overflow of find_fixedlength
An attacker can generate a buffer overflow in find_fixedlength of PCRE, in order to trigger a denial of service, and possibly to run code...
PCRE: buffer overflow of pcre_compile2
An attacker can generate a buffer overflow in pcre_compile2 of PCRE, in order to trigger a denial of service, and possibly to run code...
polkit: vulnerability
A vulnerability of polkit was announced...
polkit: vulnerability
A vulnerability of polkit was announced...
polkit: information disclosure via Cookie Counter Wrapping
An attacker can bypass access restrictions to data in Cookie Counter Wrapping of polkit, in order to obtain sensitive information...
polkit: denial of service via authentication_agent_new
An attacker can generate a fatal error in authentication_agent_new of polkit, in order to trigger a denial of service...
Battle for Wesnoth: information disclosure
An attacker can bypass access restrictions to data of Battle for Wesnoth, in order to obtain sensitive information...
cups-x2go: code execution via ps2pdf
An attacker can use a vulnerability in the call to ps2pdf by cups-x2go, in order to run code...
libwmf: use after free via wmf2gd/wmf2eps
An attacker can force the usage of a freed memory area in wmf2gd/wmf2eps of libwmf, in order to trigger a denial of service, and possibly to run code...
libwmf: buffer overflow of meta_pen_create
An attacker can generate a buffer overflow in meta_pen_create of libwmf, in order to trigger a denial of service, and possibly to run code...
libwmf: integer overflow of RLE decoding
An attacker can generate an integer overflow in RLE decoding of libwmf, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 527 528 529 530 531 532 533 534 535 537 539 540 541 542 543 544 545 546 547 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127