The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Wireless LAN Controller: denial of service via RADIUS
An attacker can forge a disconnect RADIUS packet to Cisco Wireless LAN Controller, in order to trigger a denial of service...
Linux kernel, NetworkManager: denial of service via IPv6 RA MTU
An attacker can send an IPv6 RA packet with a malicious MTU, which is accepted by NetworkManager and by the Linux kernel, in order to trigger a denial of service...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Jasig CAS Server: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Jasig CAS Server, in order to run JavaScript code in the context of the web site...
IcedTea-Web: privilege escalation
An attacker can bypass restrictions of IcedTea-Web, in order to escalate his privileges...
WordPress Vertical Image Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Vertical Image Slider, in order to run JavaScript code in the context of the web site...
ElasticSearch: Man-in-the-Middle of cloud-azure
An attacker can act as a Man-in-the-Middle on ElasticSearch cloud-azure, in order to read or write data in the session...
ldapauth, ldapauth-fork: LDAP injection
An attacker can use a LDAP injection of ldapauth or ldapauth-fork, in order to read or alter data...
DataTables: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of DataTables, in order to run JavaScript code in the context of the web site...
Newphoria Applications: privilege escalation via whitelist.xml
An attacker can bypass restrictions in whitelist.xml of Newphoria Applications, in order to escalate his privileges...
Cisco ASR 9000: denial of service via DHCPv6
An attacker can send a malicious DHCPv6 packet to Cisco ASR 9000, in order to trigger a denial of service...
Cisco Unity Connection: SQL injection
An attacker can use a SQL injection of Cisco Unity Connection, in order to read or alter data...
ownCloud Desktop Client: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on ownCloud Desktop Client, in order to read or write data in the session...
remind: buffer overflow of DumpSysVar
An attacker can generate a buffer overflow in DumpSysVar of remind, in order to trigger a denial of service, and possibly to run code...
Cisco Secure ACS: denial of service via SSH Screen Process
An authenticated attacker can stop the SSH Screen Process of Cisco Secure ACS, in order to trigger a denial of service...
Cisco ASR 9000: denial of service via DHCPv6
An attacker can send a malicious DHCPv6 packet to Cisco ASR 9000, in order to trigger a denial of service...
QEMU: denial of service via virtio-net
An attacker on the local network can send large packets, which are not supported by the virtio-net driver of Qemu, in order to trigger a denial of service...
WordPress CP Reservation Calendar: SQL injection
An attacker can use a SQL injection of WordPress CP Reservation Calendar, in order to read or alter data...
sblim-sfcb: NULL pointer dereference via lookupProviders
An attacker can force a NULL pointer to be dereferenced in lookupProviders of sblim-sfcb, in order to trigger a denial of service...
Squid cache: two vulnerabilities of SslBump
Several vulnerabilities were announced in Squid cache, configured in ssl-bump mode...
Cisco Prime Network Registrar: privilege escalation
A local attacker can use a default account of Cisco Prime Network Registrar, in order to escalate his privileges...
IPython: Cross Site Scripting of Local Folder Name
An attacker can trigger a Cross Site Scripting in Local Folder Name of IPython, in order to run JavaScript code in the context of the web site...
WordPress xPinner Lite: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress xPinner Lite, in order to run JavaScript code in the context of the web site...
WordPress WP Shop: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Shop, in order to run JavaScript code in the context of the web site...
WordPress ALO EasyMail Newsletter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress ALO EasyMail Newsletter, in order to run JavaScript code in the context of the web site...
Symantec Web Gateway: six vulnerabilities
An attacker can use several vulnerabilities of Symantec Web Gateway...
Red Hat OpenShift server: code execution
An attacker can use a vulnerability of Red Hat OpenShift server, in order to run code...
FreeRADIUS: buffer overflow of Tunnel-Password
An attacker can generate a buffer overflow with a Tunnel-Password attribute sent to FreeRADIUS in proxy mode, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 545 546 547 548 549 550 551 552 553 555 557 558 559 560 561 562 563 564 565 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020