History of vulnerabilities analyzed by Vigil@nce: OpenSSH: key disclosure via Roaming An attacker, who owns a malicious SSH server, can invite a client to connect with OpenSSH, and then call the Roaming feature, in order to obtain sensitive information about keys used by the SSH client... ProcessOne ejabberd: predictability of random number An attacker can predict a random in ProcessOne ejabberd, in order to access to some features... FreeBSD: information disclosure via /etc/snmpd.config An attacker can read /etc/snmpd.config of FreeBSD, in order to obtain sensitive information... FreeBSD: denial of service via TCP MD5 A local (remote in some special configurations) attacker can send a malicious TCP packet to FreeBSD, in order to trigger a denial of service... FreeBSD: privilege escalation via Linux setgroups A local attacker can use setgroups() on the Linux Compatibility Layer of FreeBSD, in order to escalate his privileges... FreeBSD: privilege escalation via Linux futex A local attacker can use a futex on the Linux Compatibility Layer of FreeBSD, in order to escalate his privileges... FreeBSD: assertion error via SCTP ICMPv6 An attacker can force an assertion error in the SCTP stack with ICMPv6 on FreeBSD, in order to trigger a denial of service... HPE ArcSight Logger: two vulnerabilities An attacker can use several vulnerabilities of HPE ArcSight Logger... Drupal RedHen: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal RedHen, in order to run JavaScript code in the context of the web site... Python-RSA: fake signature via Bleichenbacher Attack An attacker can use a Bleichenbacher attack against Python-RSA, in order to create a fake signature... Cisco Aironet 1800: privilege escalation via Default Account An attacker can use a default account of Cisco Aironet 1800, in order to access to the system... Cisco Aironet 1800: denial of service via IP An attacker can send a malicious IP packet to Cisco Aironet 1800, in order to trigger a denial of service... Cisco WLC: administration access An attacker can bypass access restrictions of Cisco WLC, in order to read or alter configuration... Junos: denial of service via J-Web Embedthis Appweb Server An attacker can use J-Web Embedthis Appweb Server of Junos, in order to trigger a denial of service... Junos: denial of service via IGMPv3 An attacker can send a malicious IGMPv3 packet to Junos, in order to trigger a denial of service... Junos: infinite loop of EX-PFE An attacker can generate an infinite loop in Junos on EX4300, in order to trigger a denial of service... Junos: denial of service via RTSP An attacker can send a malicious RTSP packet to Junos, in order to trigger a denial of service... Junos: denial of service via LDP An attacker can send a malicious LDP packet to Junos, in order to trigger a denial of service... Node.js Mapbox.js: Cross Site Scripting of TileJSON An attacker can trigger a Cross Site Scripting in TileJSON of Node.js Mapbox.js, in order to run JavaScript code in the context of the web site... WordPress Commentator: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Commentator, in order to run JavaScript code in the context of the web site... libvirt: denial of service via Volume Creation An attacker can generate a fatal error in Volume Creation of libvirt, in order to trigger a denial of service... FFmpeg: three vulnerabilities An attacker can use several vulnerabilities of FFmpeg... ISC DHCP: buffer overflow of decode_udp_ip_header An attacker can generate a buffer overflow by sending an IPv4+UDP packet to an ISC DHCP client or server, in order to trigger a denial of service, and possibly to run code... Shotwell: vulnerability of TLS Certificates A vulnerability in TLS Certificates of Shotwell was announced... Microsoft Exchange: four vulnerabilities of Spoofing An attacker can use several vulnerabilities of Spoofing of Microsoft Exchange... Windows: two vulnerabilities of Mount Point Several vulnerabilities were announced in the management of mount points by Windows... Windows: six vulnerabilities An attacker can use several vulnerabilities of Windows... Microsoft Silverlight: memory corruption via Decoder An attacker can generate a memory corruption in with a decoder of Microsoft Silverlight, in order to trigger a denial of service, and possibly to run code... Windows: two vulnerabilities of Kernel Drivers An attacker can use several vulnerabilities of Kernel Drivers of Windows... Microsoft Office, SharePoint, Visual Basic: five vulnerabilities An attacker can use several vulnerabilities of Microsoft Office, SharePoint... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1116