The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
BIND: denial of service via OpenPGP Key
An attacker can query BIND for a domain containing a malformed OpenPGP key, to force an assertion error in openpgpkey_61.c, in order to trigger a denial of service...
BIND: denial of service via DNSSEC Key
An attacker can query BIND for a domain containing a malformed DNSSEC key, to force an assertion error in buffer.c, in order to trigger a denial of service...
WordPress WPML: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WPML, in order to run JavaScript code in the context of the web site...
Joomla Content Editor: file upload
An attacker can upload a malicious file on Joomla Content Editor, in order for example to upload a Trojan...
Ruggedcom ROS: packet transmission between VLAN
An attacker can use the IP Forwarding feature of Ruggedcom ROS, in order to send a packet to another VLAN...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
F-Secure Anti-Virus: privilege escalation via FSGK.SYS
A local attacker can use the FSGK.SYS driver of F-Secure Anti-Virus, in order to escalate his privileges...
Cisco NX-OS: denial of service via ARP
An attacker can send a malicious ARP packet to Cisco NX-OS, in order to trigger a denial of service...
WordPress WatuPRO: two vulnerabilities
An attacker can use several vulnerabilities of WordPress WatuPRO...
Fortinet FortiClient: four vulnerabilities
An attacker can use several vulnerabilities of Fortinet FortiClient...
HP LoadRunner Controller: buffer overflow of LRS
An attacker can generate a buffer overflow with a LRS file on HP LoadRunner Controller, in order to trigger a denial of service, and possibly to run code...
Xen: denial of service via xenmem_add_to_physmap_one
A local privileged attacker can call xenmem_add_to_physmap_one() on Xen, in order to trigger a denial of service...
pcs: privilege escalation via Command injection
An attacker can bypass restrictions in Command injection of pcs, in order to escalate his privileges...
pcs: privilege escalation via Web UI
An attacker can bypass restrictions in Web UI of pcs, in order to escalate his privileges...
puppetlabs-firewall: permissive rules with port
When the administrator used example rules, an attacker can send some packets through puppetlabs-firewall...
Cisco ASR 1000: denial of service via IPv4 Fragments
An attacker can send numerous fragmented IPv4 packets to Cisco ASR 1000, in order to trigger a denial of service...
WordPress Testimonial Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Testimonial Slider, in order to run JavaScript code in the context of the web site...
Joomla GoogleSearch: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla GoogleSearch, in order to run JavaScript code in the context of the web site...
Jakarta Tag Library: external XML entity injection
An attacker can transmit malicious XML data to Jakarta Tag Library, in order to read a file, scan sites, or trigger a denial of service...
WordPress Job Manager: CV reading
An attacker can read a CV of WordPress Job Manager, in order to obtain sensitive information...
WordPress Captain Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Captain Slider, in order to run JavaScript code in the context of the web site...
WordPress Navis DocumentCloud: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Navis DocumentCloud, in order to run JavaScript code in the context of the web site...
WordPress NextGEN Gallery: directory traversal
An attacker can traverse directories of WordPress NextGEN Gallery, in order to read a file outside the service root path...
Openswan: denial of service via IKE Diffie-Hellman
An attacker can send a malicious IKE packet, to force an assertion error in a DH computation by Openswan, in order to trigger a denial of service...
Cisco ASR 1000: denial of service of VFR via IP
An attacker can send a malicious IP packet to Cisco ASR 1000, in order to trigger a denial of service...
Cisco ASR 1000: denial of service via IP
An attacker can send a malicious IP packet to Cisco ASR 1000, in order to trigger a denial of service...
Cisco ASR 1000: denial of service via SIP
An attacker can send a malicious SIP packet to Cisco ASR 1000, in order to trigger a denial of service...
Cisco ASR 1000: denial of service via IPv6
An attacker can send a malicious IPv6 packet to Cisco ASR 1000, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 540 541 542 543 544 545 546 547 548 550 552 553 554 555 556 557 558 559 560 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020