The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Cisco Secure ACS: Cross Site Scripting of Help Index
An attacker can trigger a Cross Site Scripting in the Help Index of Cisco Secure ACS, in order to execute JavaScript code in the context of the web site...
1 libvirt: denial of service via Event Registration
An attacker can register several events in libvirt, in order to trigger a denial of service...
2 Apache HTTP Server: denial of service via mod_dav
An attacker can send a MERGE query for mod_dav of Apache HTTP Server, in order to trigger a denial of service...
2 WordPress Pie Register: Cross Site Scripting of pass1/pass2
An attacker can trigger a Cross Site Scripting in the pass1/pass2 parameters of WordPress Pie Register, in order to execute JavaScript code in the context of the web site...
2 WordPress Spicy Blogroll: file inclusion
An attacker can include a file in WordPress Spicy Blogroll, in order to obtain sensitive information...
2 Squid cache: denial of service via HTTP Port
An attacker can send an HTTP query with a malformed port number, in order to trigger a denial of service in Squid cache...
1 X.Org xf86-video-intel: denial of service via PNG
An attacker can invite the victim to display a malicious PNG image in an X.Org environment with an Intel video device, in order to trigger a denial of service...
2 WordPress I Love It: Cross Site Scripting
An attacker can trigger a Cross Site Scripting in WordPress I Love It, in order to execute JavaScript code in the context of the web site...
2 McAfee ePO: multiple vulnerabilities
An attacker can use several vulnerabilities of McAfee ePolicy Orchestrator...
2 McAfee ePO Extension for McAfee Agent: SQL injection of DisplayMSAPropsDetail.do
An attacker can use a SQL injection in DisplayMSAPropsDetail.do of McAfee ePO Extension for McAfee Agent, in order to read or alter data...
1 Linux kernel: privilege escalation via Disk Name
A local administrator (uid 0) attacker can use a disk name triggering a format string attack in the Linux kernel, in order to escalate his privileges (ring 0)...
2 Cyrus SASL: denial of service via crypt
An attacker can use a malformed salt during the authentication to Cyrus SASL, in order to stop the service...
2 Mozilla Firefox, Thunderbird, Seamonkey: privilege escalation via the uninstaller
An attacker can use the uninstaller of Mozilla Firefox, Thunderbird, Seamonkey, in order to escalate his privileges...
2 Javadoc: Frame injection via Relative URI
An attacker can use a relative URI, to inject an HTML page in web sites generated with Javadoc, in order to trigger a phishing attack on victims connecting on the web site...
3 PHP: memory corruption via l'analyseur XML
An attacker can generate a memory corruption in the XML parser of PHP, in order to trigger a denial of service, and possibly to execute code...
2 Cisco Unified MeetingPlace: Cross Site Scripting of Web Conferencing
An attacker can trigger a Cross Site Scripting in Web Conferencing of Cisco Unified MeetingPlace, in order to execute JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: memory leak via Domain Manager
An attacker can create a memory leak in Domain Manager of Cisco Unified Communications Manager, in order to trigger a denial of service...
2 Cisco Unified Communications Manager: Cross Site Scripting of Domain Manager
An attacker can trigger a Cross Site Scripting in Domain Manager of Cisco Unified Communications Manager, in order to execute JavaScript code in the context of the web site...
2 Joomla: Cross Site Scripting of aiContactSafe
An attacker can trigger a Cross Site Scripting in aiContactSafe of Joomla, in order to execute JavaScript code in the context of the web site...
3 Attachments for Joomla: PHP code execution via file upload
An attacker can upload a PHP file to a Joomla serve including the Attachments extension, in order to make the server run it...
3 HP Network Node Manager I: buffer overflow of pmd.exe
An attacker can generate a buffer overflow in pmd.exe of HP Network Node Manager I, in order to trigger a denial of service, and possibly to execute code...
2 Squid Proxy Cache: buffer overflow via HTTP request processing
An attacker can generate a buffer overflow in the processing of HTTP requests by Squid Proxy Cache, in order to trigger a denial of service, and possibly to execute code...
2 Drupal: denial of service via Stage File Proxy
An attacker can exploit multiple vulnerabilities in Stage File Proxy of Drupal, in order to trigger a denial of service...
3 Juniper JunOS: denial of service via the TCP relays
An attacker can send specially crafted packets to the relays of Juniper JunOS for some protocols, in order to trigger a denial of service...
3 Juniper JunOS: buffer overflow of Captive Portal
An attacker can generate a buffer overflow in the HTTP server of Captive Portal of Juniper JunOS, in order to trigger a denial of service, and possibly to execute code...
3 Juniper JunOS: denial of service via Protocol-Independent Multicast
An attacker can send Protocol-Independent Multicast packets to Juniper JunOS, in order to trigger a denial of service...
1 Juniper JunOS: information disclosure via the padding of Ethernet frames
An attacker can sniff Ethernet frames sent by Juniper JunOS, in order to obtain sensitive information...
3 Juniper JunOS: denial of service via MSRPC
An attacker can send MSRPC requests to Juniper JunOS, in order to trigger a denial of service...
3 Juniper JunOS: denial of service via ARP
An attacker can send ARP requests to Juniper JunOS, in order to trigger a denial of service...
2 Drupal TinyBox: Cross Site Scripting
An attacker can trigger a Cross Site Scripting in TinyBox for Drupal, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 384 385 386 387 388 389 390 391 392 394 396 397 398 399 400 401 402 403 404 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 993