The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS: denial of service via IP SLA
An attacker can send malformed IP SLA (Service Level Agreement) packets, in order to trigger a denial of service...
Cisco IOS: memory leak of IKE
An attacker can send malformed IKE packets, in order to trigger a memory leak, which leads to a denial of service...
Cisco IOS: memory leak of SIP
An attacker can send malformed SIP packets, in order to trigger a memory leak in the Zone-Based Policy Firewall inspection, which leads to a denial of service...
Check Point VSX: Anti-Virus and Anti-Bot policy not enforced
When the Security Gateway in mode VSX was restarted, the Anti-Virus and Anti-Bot policy is not enforced in some cases...
Joomla module: vulnerability of JCE Editor
A vulnerability was announced in the JCE Editor module of Joomla...
Windows 8, 2012, RT: url spoofing of Windows Modern Mail
An attacker can send an email containing a link, which is indicated by Windows Modern Mail as pointing to another site, in order to deceive the victim...
ISC DHCP: denial of service of regex
An attacker can use a special DNS record, in order to force ISC DHCP to consume large memory resources...
ISC BIND: denial of service of regex
An attacker can use a special DNS record, in order to force ISC BIND to consume large memory resources...
Splunk: Cross Site Scripting of Splunk Web
An attacker can trigger a Cross Site Scripting in Splunk Web, in order to execute JavaScript code in the context of the web site...
vtiger CRM: multiple vulnerabilities
An attacker can use several vulnerabilities of vtiger CRM...
WordPress module: vulnerability of Level four storefront
A vulnerability was announced in the Level four storefront module of WordPress...
WordPress module: vulnerability of Finalist
A vulnerability was announced in the Finalist module of WordPress...
HP ProCurve: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery in HP ProCurve 1700-8(J9079A) and 1700-24(J9080A), in order to force the victim to perform operations...
libxslt: denial of service of xsltAddKey
An attacker can create a malicious XSL file using xsl:key, and send it to applications linked to libxslt, in order to stop them...
libxslt: denial of service of xsltDocumentFunction
An attacker can create a malicious XSL file using document(), and send it to applications linked to libxslt, in order to stop them...
Wordpress module: vulnerability of Mathjax Latex
A vulnerability was announced in the Mathjax Latex module of Wordpress...
LibreOffice: code execution via Update
During the automatic update procedure, LibreOffice does not check the signature of the downloaded file, before downloading it...
WordPress module: vulnerability of Backupbuddy
A vulnerability was announced in the Backupbuddy module of WordPress...
WordPress module: vulnerability of WP-Banners-Lite
A vulnerability was announced in the WP-Banners-Lite module of WordPress...
WordPress module: vulnerability of IndiaNIC FAQs Manager
A vulnerability was announced in the IndiaNIC FAQs Manager module of WordPress...
WordPress module: vulnerability of Occasions
A vulnerability was announced in the Occasions module of WordPress...
WordPress module: vulnerability of Count per Day
A vulnerability was announced in the Count per Day module of WordPress...
WordPress module: vulnerability of Simply Poll
A vulnerability was announced in the Simply Poll module of WordPress...
Joomla module: vulnerability of RSfiles
A vulnerability was announced in the RSfiles module of Joomla...
WordPress module: vulnerability of LeagueManager
A vulnerability was announced in the LeagueManager module of WordPress...
IBM Notes: three vulnerabilities
An attacker can use three vulnerabilities of IBM Notes, in order to execute code or to trigger a denial of service...
IBM Domino: seven vulnerabilities
An attacker can use seven vulnerabilities of IBM Domino, in order to elevate his privileges or to obtain information...
OpenBSD: double free of TFTP
When the TFTP service is enabled, an attacker can send a malformed option, in order to trigger a double memory free, which leads to a denial of service and possibly to code execution...
Symantec Enterprise Vault for File System Archiving: privilege elevation
A local attacker can store a malicious program in the search path of two services of Symantec Enterprise Vault for File System Archiving, in order to execute code with system privileges...
Drupal: Cross Site Scripting of Views
An attacker with the privilege "Administer vocabularies and terms" can trigger a Cross Site Scripting in the Views module of Drupal...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 366 367 368 369 370 371 372 373 374 376 378 379 380 381 382 383 384 385 386 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1047