The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 Cisco Nexus 9000: denial of service via Layer 2
An attacker can send a malicious Layer 2 packet to Cisco Nexus 9000, in order to trigger a denial of service...
2 Cisco IOS XE: denial of service via Cisco Discovery Protocol
An attacker can send a malicious Cisco Discovery Protocol packet to Cisco IOS XE, in order to trigger a denial of service...
2 Drupal Scald: information disclosure
An attacker can bypass access restrictions to data of Drupal Scald, in order to obtain sensitive information...
2 Drupal amoCRM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal amoCRM, in order to run JavaScript code in the context of the web site...
2 Drupal 7 driver for SQL Server and SQL Azure: SQL injection
An attacker can use a SQL injection of Drupal 7 driver for SQL Server and SQL Azure, in order to read or alter data...
2 VMware vCenter Server: Man-in-the-Middle of LDAP
An attacker can act as a Man-in-the-Middle between the LDAP server and VMware vCenter Server, in order to read or write data in the session...
2 Debian/Ubuntu: privilege escalation via the openldap openldap/slapd
An attacker can bypass restrictions in the openldap/slapd package of Debian/Ubuntu, in order to escalate his privileges...
1 Unity Settings Daemon: privilege escalation
An attacker can bypass restrictions of Unity Settings Daemon, in order to escalate his privileges...
2 ICU: integer overflow of LETableReference
An attacker can generate an integer overflow in LETableReference of ICU, in order to trigger a denial of service, and possibly to run code...
2 Drupal CMS Updater: two vulnerabilities
An attacker can use several vulnerabilities of Drupal CMS Updater...
2 Ogg Vorbis: buffer overflow of AIFF alloca
An attacker can generate a buffer overflow in AIFF alloca of Ogg Vorbis, in order to trigger a denial of service, and possibly to run code...
2 Cisco Prime Collaboration Provisioning: privilege escalation
An attacker can use Cisco Prime Collaboration Provisioning, in order to escalate his privileges...
2 Cisco Prime Collaboration Assurance: three vulnerabilities
An attacker can use several vulnerabilities of Cisco Prime Collaboration Assurance...
2 WordPress MyPixs: directory traversal
An attacker can traverse directories of WordPress MyPixs, in order to read a file outside the service root path...
3 WordPress Csv2WPeC Coupon: file upload
An attacker can upload a malicious file on WordPress Csv2WPeC Coupon, in order for example to upload a Trojan...
2 WordPress Widgetize Pages Light: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Widgetize Pages Light, in order to run JavaScript code in the context of the web site...
2 WordPress GigPress: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress GigPress, in order to run JavaScript code in the context of the web site...
2 Zend Framework: two vulnerabilities
An attacker can use several vulnerabilities of Zend Framework...
2 Moodle: four vulnerabilities
An attacker can use several vulnerabilities of Moodle...
2 Moodle: eight vulnerabilities
An attacker can use several vulnerabilities of Moodle...
2 ICU: unreachable memory reading
An attacker can force a read at an invalid address of ICU, in order to trigger a denial of service...
2 WordPress Core: three vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
2 QEMU: buffer overflow of ne2000_receive
An attacker privileged in a guest system can generate a buffer overflow in ne2000_receive of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
1 QEMU: infinite loop of ne2000_receive
An attacker privileged in a guest system can generate an infinite loop in ne2000_receive() of QEMU, in order to trigger a denial of service on the host system...
3 WordPress EZ SQL Reports: two vulnerabilities
An attacker can use several vulnerabilities of WordPress EZ SQL Reports...
2 WordPress KVS Player: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress KVS Player, in order to run JavaScript code in the context of the web site...
2 WordPress Video Player: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Video Player, in order to run JavaScript code in the context of the web site...
2 AIX: privilege escalation via PowerHA SystemMirror
A local attacker can use PowerHA SystemMirror of AIX, in order to escalate his privileges...
2 Openfire: five vulnerabilities
An attacker can use several vulnerabilities of Openfire...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 544 545 546 547 548 549 550 551 552 554 556 557 558 559 560 561 562 563 564 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996