History of vulnerabilities analyzed by Vigil@nce: VLC: vulnerability of Third Party Libraries A vulnerability in Third Party Libraries of VLC was announced... WordPress Advanced Custom Fields: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Advanced Custom Fields, in order to run JavaScript code in the context of the web site... WordPress Ghost: file reading An attacker can read a file of WordPress Ghost, in order to obtain sensitive information... Juniper EX: incorrect filtering of OSPF An attacker can send OSPF packets to Juniper EX, which are not blocked... Google Android OS: multiple vulnerabilities An attacker can use several vulnerabilities of Google Android OS... Mercurial: code execution via Git An attacker can use a vulnerability in Git of Mercurial, in order to run code... Botan: vulnerability of ECDSA Side Channel Attack A vulnerability in ECDSA Side Channel Attack of Botan was announced... Botan: vulnerability of RSA Decryption Side Channel Attack A vulnerability in RSA Decryption Side Channel Attack of Botan was announced... Botan: two vulnerabilities An attacker can use several vulnerabilities of Botan... Ubuntu 16.04: privilege escalation via ubuntu-core-launcher An attacker can bypass restrictions in ubuntu-core-launcher of Ubuntu 16.04, in order to escalate his privileges... IBM JDK: code execution via CORBA Deserialization An attacker can use a vulnerability in CORBA Deserialization of IBM JDK, in order to run code... IBM JDK: code execution via CORBA Invoke An attacker can use a vulnerability in CORBA Invoke of IBM JDK, in order to run code... IBM JDK: buffer overflow of JVM An attacker can generate a buffer overflow in JVM of IBM JDK, in order to trigger a denial of service, and possibly to run code... Linux kernel: root file creation via coredump An attacker can trigger a coredump with a special configuration of the Linux kernel, in order to create a file with root privileges... OpenVAS: Cross Site Scripting of get_aggregate An attacker can trigger a Cross Site Scripting in get_aggregate of OpenVAS, in order to run JavaScript code in the context of the web site... RoundCube Webmail: Cross Site Request Forgery An attacker can trigger a Cross Site Request Forgery of RoundCube Webmail, in order to force the victim to perform operations... RoundCube Webmail: Cross Site Scripting An attacker can trigger a Cross Site Scripting of RoundCube Webmail, in order to run JavaScript code in the context of the web site... RoundCube Webmail: Cross Site Scripting An attacker can trigger a Cross Site Scripting of RoundCube Webmail, in order to run JavaScript code in the context of the web site... tardiff: two vulnerabilities An attacker can use several vulnerabilities of tardiff... WordPress Google Authenticator: privilege escalation An attacker can bypass restrictions of WordPress Google Authenticator, in order to escalate his privileges... WordPress Simple Photo Gallery: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Simple Photo Gallery, in order to run JavaScript code in the context of the web site... WordPress Truemag: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Truemag, in order to run JavaScript code in the context of the web site... WordPress Core: three vulnerabilities An attacker can use several vulnerabilities of WordPress Core... Joomla Komento: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Joomla Komento, in order to run JavaScript code in the context of the web site... Google Chrome: multiple vulnerabilities An attacker can use several vulnerabilities of Google Chrome... IBM DB2: denial of service via DRDA An attacker can send a malicious DRDA packet to IBM DB2, in order to trigger a denial of service... PHP: multiple vulnerabilities An attacker can use several vulnerabilities of PHP... i7z: denial of service via Print_Information_Processor An attacker can generate a fatal error in Print_Information_Processor of i7z, in order to trigger a denial of service... WordPress Jetpack: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Jetpack, in order to run JavaScript code in the context of the web site... Apache Subversion: two vulnerabilities An attacker can use several vulnerabilities of Apache Subversion... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103