The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal: Cross Site Scripting of Hatch theme
An attacker can trigger a Cross Site Scripting in the Hatch theme for Drupal, in order to execute JavaScript code in the context of the web site...
Adobe Shockwave Player: code execution
An attacker can trigger code execution in Adobe Shockwave Player...
Adobe Flash Player: multiple vulnerabilities
Several vulnerabilities of Adobe Flash Player can be used by an attacker to execute code...
Windows Defender: privilege escalation via pathname
A local attacker can use a special pathname, in order to escalate his privileges via Windows Defender...
Windows Media Player: code execution via Wmvdecod.dll
An attacker can invite the victim to open a malicious WMV multimedia document with Windows Media Player, in order to execute code on his computer...
Windows: code execution via DirectShow GIF
An attacker can invite the victim to open a malicious GIF image, in order to execute code on his computer...
Internet Explorer: multiple vulnerabilities
An attacker can invite the victim to display a malicious site with Internet Explorer, in order to execute code on his computer...
Windows, Office, .NET, Lync: code execution via TrueType
An attacker can invite the victim to open a document containing a malicious font, generating an error in the Windows kernel, in order to execute code...
Windows: multiple vulnerabilities of kernel drivers
An attacker can use several vulnerabilities of kernel drivers of Windows...
Microsoft .NET, Silverlight: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft .NET and Silverlight...
Cisco Unified Operations Manager, Service Monitor: Cross Site Scripting
An attacker can trigger a Cross Site Scripting in Cisco Unified Operations Manager and Cisco Unified Service Monitor, in order to execute JavaScript code in the context of the web site...
Cisco Nexus 1000V: privilege escalation via License Installation
A local attacker can inject a shell command in the License Installation module of Cisco Nexus 1000V, in order to escalate his privileges...
Solaris: privilege escalation via 144751-01 postinstall
A local attacker can use the 144751-01 postinstall script, in order to escalate his privileges on Solaris x86...
Wordpress JS Restaurant: SQL injection
An attacker can use a SQL injection in Wordpress JS Restaurant, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 383 384 385 386 387 388 389 390 391 393 395 396 397 398 399 400 401 402 403 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1047