History of vulnerabilities analyzed by Vigil@nce: WordPress Events Made Easy: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Events Made Easy, in order to run JavaScript code in the context of the web site... Avast: file moved/deleted via ZIP An attacker can send a malicious ZIP file to Avast, in order to force a file to be moved/deleted... WordPress Video Gallery: Cross Site Request Forgery An attacker can trigger a Cross Site Request Forgery of WordPress Video Gallery, in order to force the victim to perform operations... LibreSSL: two vulnerabilities An attacker can use several vulnerabilities of LibreSSL... Spring Framework: code execution via Reflected File Download An attacker can trigger a Reflected File Download with Spring Framework, in order to invite the victim to run malicious code... F5 BIG-IP: denial of service via vCMP An attacker can send a malicious packet to F5 BIG-IP vCMP, in order to trigger a denial of service... OpenStack Networking/Neutron: privilege escalation via AMQP API An attacker can bypass restrictions in AMQP API of OpenStack Networking/Neutron, in order to escalate his privileges... OpenStack Compute/Nova: denial of service via Resize State An attacker can generate a fatal error in Resize State of OpenStack Compute/Nova, in order to trigger a denial of service... OpenStack Glance: denial of service via Image An attacker can generate a fatal error in Image of OpenStack Glance, in order to trigger a denial of service... OpenStack Glance: vulnerability of x-image-meta-status A vulnerability in x-image-meta-status of OpenStack Glance was announced... OpenStack Swift: information disclosure An attacker can bypass access restrictions to data of OpenStack Swift, in order to obtain sensitive information... Click: privilege escalation An attacker can bypass restrictions of Click, in order to escalate his privileges... Firefox: information disclosure via fetch An attacker can use the fetch() function in a web site, in order to obtain sensitive information belonging to another site... Red Hat JBoss Enterprise Application Platform: three vulnerabilities An attacker can use several vulnerabilities of Red Hat JBoss Enterprise Application Platform... WordPress WP-Piwik: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress WP-Piwik, in order to run JavaScript code in the context of the web site... OpenBSD: denial of service via kevent A local attacker can block kevents on OpenBSD, in order to trigger a denial of service... RHEL: disabling securelevel with UEFI Secure Boot After some operations with UEFI Secure Boot, a local attacker can thus use kexec_load to load an unsigned kernel... Wireshark: memory corruption via Interface Filter An attacker can generate a memory corruption in Wireshark, in order to trigger a denial of service, and possibly to run code... Adobe Flash Player: three vulnerabilities An attacker can invite the victim to visit a malicious site, calling Adobe Flash Player, in order to run code... Juniper Junos: infinite loop of SSH An unauthenticated attacker can generate an infinite loop in SSH of Juniper Junos, in order to trigger a denial of service... Juniper Junos: privilege escalation via pam.conf A local attacker can wait for the corruption of the pam.conf file of Juniper Junos, in order to escalate his privileges... Juniper Junos: port opening via FTPS An attacker can make malicious packets traverse SRX with the FTPS protocol... ScreenOS: denial of service via L2TP An attacker can send a malicious L2TP packet to ScreenOS, in order to trigger a denial of service... Juniper Junos: denial of service via vSRX An attacker can send a malicious query to vSRX with Juniper Junos, in order to trigger a denial of service... Juniper Junos: denial of service via uBFD An attacker can send a malicious uBFD packet to Juniper Junos, in order to trigger a denial of service... Drupal Twilio: privilege escalation An attacker can perform reserved operations via the Drupal Twilio module, in order to escalate his privileges... Juniper Junos: denial of service via SRX5000 J-Web An attacker can send a malicious query to J-Web of Juniper Junos on SRX5000, in order to trigger a denial of service... Juniper Junos: denial of service via IPv6 An attacker can send malicious IPv6 packets to Juniper Junos, in order to trigger a denial of service... OpenNMS: external XML entity injection An attacker can transmit malicious XML data to OpenNMS, in order to read a file, scan sites, or trigger a denial of service... Juniper Junos Space: three vulnerabilities An attacker can use several vulnerabilities of Juniper Junos Space... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114