The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress WP Canvas Shortcodes: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Canvas Shortcodes, in order to run JavaScript code in the context of the web site...
SIMATIC CP 1543-1: two vulnerabilities
An attacker can use several vulnerabilities of SIMATIC CP 1543-1...
PAN-OS: four vulnerabilities
An attacker can use several vulnerabilities of PAN-OS...
Norton, Symantec Endpoint Protection: privilege escalation via DLL Pre-loading
An attacker can bypass restrictions via DLL Pre-loading of Norton or Symantec Endpoint Protection, in order to escalate his privileges...
WordPress Sirv: SQL injection
An attacker can use a SQL injection of WordPress Sirv, in order to read or alter data...
WordPress Answer My Question: SQL injection
An attacker can use a SQL injection of WordPress Answer My Question, in order to read or alter data...
LibTIFF: buffer overflow via tiff2pdf
An attacker can generate a buffer overflow via tiff2pdf of LibTIFF, in order to trigger a denial of service, and possibly to run code...
ImageMagick: memory corruption via AcquireMagickMemory
An attacker can generate a memory corruption via AcquireMagickMemory of ImageMagick, in order to trigger a denial of service, and possibly to run code...
WordPress Post Indexer: two vulnerabilities
An attacker can use several vulnerabilities of WordPress Post Indexer...
WordPress Post Grid: denial of service
An attacker can delete a file of WordPress Post Grid, in order to trigger a denial of service...
Cisco ASA: privilege escalation via XML Commands
An attacker can bypass restrictions via XML Commands of Cisco ASA, in order to escalate his privileges...
Cisco ASR 5000: denial of service via ipsecmgr
An attacker can generate a fatal error via ipsecmgr of Cisco ASR 5000, in order to trigger a denial of service...
Cisco ESA: bypassing via MIME
An attacker can send a malformed MIME header, in order to bypass the filter of Cisco ESA...
Cisco ESA: bypassing via MIME
An attacker can send a malformed MIME header, in order to bypass the filter of Cisco ESA...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Wireshark: five vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Drupal Core: four vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...
WordPress NextGEN Gallery: directory traversal
An attacker can traverse directories of WordPress NextGEN Gallery, in order to read a file outside the service root path...
WordPress All In One WP Security & Firewall: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress All In One WP Security & Firewall, in order to run JavaScript code in the context of the web site...
Symantec Ghost Solution Suite: code execution via DLL Loading
An attacker can use a vulnerability via DLL Loading of Symantec Ghost Solution Suite, in order to run code...
ICMP: denial of service via ICMP Type 3 Code 3, BlackNurse
An attacker can send numerous ICMP Type 3 Code 3 packets to some routers/firewalls, in order to trigger a denial of service...
WordPress Google Analytics Counter Tracker: code execution
An attacker can use a vulnerability of WordPress Google Analytics Counter Tracker, in order to run code...
libxml2: external XML entity injection via xmlNewEntityInputStream
An attacker can transmit malicious XML data to libxml2, in order to read a file, scan sites, or trigger a denial of service...
Novell Open Enterprise Server: read-write access
An attacker can bypass access restrictions of Novell Open Enterprise Server, in order to read or alter data...
Perl DBD-mysql: out-of-bounds memory reading
An attacker can force a read at an invalid address of Perl DBD::mysql, in order to trigger a denial of service, or to obtain sensitive information...
Akonadi: denial of service
An attacker can generate a fatal error of Akonadi, in order to trigger a denial of service...
Moin: three vulnerabilities
An attacker can use several vulnerabilities of Moin...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 652 653 654 655 656 657 658 659 660 662 664 665 666 667 668 669 670 671 672 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021