The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ArcGIS for Server: multiple vulnerabilities
An attacker can use several vulnerabilities of ArcGIS for Server...
Cisco ASA: denial of service via Certificate Processing
An attacker can use a heavy SSL/TLS traffic load, in order to trigger a denial of service during the certificate processing of Cisco ASA...
GDM: changing permissions via /tmp/.X11-unix
A local attacker can create a symbolic link from /tmp/.X11-unix during the usage of GDM, in order to force a permission change on another file...
Joomla AceSEF: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla AceSEF, in order to execute JavaScript code in the context of the web site...
WordPress ShareThis: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress ShareThis, in order to force the victim to perform operations...
Symantec Endpoint Protection: uninstalling without password
A local administrator, who does not know the uninstallation password, can still uninstall the Symantec Endpoint Protection product...
Drupal: inserting text/links in comments
An attacker can create a comment using a hidden CSS selector, in order for example to add a link pointing from the Drupal site to his site...
Drupal Make Meeting Scheduler: access to polls
An attacker can use a direct url, in order to access to votes of Drupal Make Meeting Scheduler...
Linux kernel: privilege escalation via SCM_RIGHTS
A local attacker can use SCM_RIGHTS to spoof a pid, in order to escalate his privileges on the Linux kernel...
TYPO3: two vulnerabilities of FAL
An attacker can use several vulnerabilities of TYPO3...
WordPress NextGEN Smooth Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress NextGEN Smooth Gallery, in order to execute JavaScript code in the context of the web site...
Cisco Secure ACS: denial of service via TACACS+
An attacker can send malformed TCP packets to Cisco Secure ACS configured for TACACS+, in order to trigger a denial of service...
WordPress Mingle Forum: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Mingle Forum, in order to force the victim to perform operations...
Cisco Prime NCS, WCS: Cross Site Scripting of Login Page
An attacker can trigger a Cross Site Scripting in the Login Page of Cisco Prime NCS/WCS, in order to execute JavaScript code in the context of the web site...
libtiff: buffer overflow of gif2tiff
An attacker can generate a buffer overflow in gif2tiff of libtiff, in order to trigger a denial of service, and possibly to execute code...
WordPress IndiaNIC Testimonial: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress IndiaNIC Testimonial...
Joomla: SQL injection of com_pccookbook
An attacker can use a SQL injection in com_pccookbook of Joomla, in order to read or alter data...
Cisco IOS: denial of service via TCP ACK Storm
An attacker can send TCP ACK and FIN packets, to generate a TCP ACK Storm of Cisco IOS, in order to trigger a denial of service...
Cisco ASA: denial of service via Idle Timeout
An attacker can send packets which are inspected by Cisco ASA, to generate an error in the management of the Idle Timeout, in order to trigger a denial of service...
Apache Subversion: multiple vulnerabilities
An attacker can use several vulnerabilities of Apache Subversion...
imagemagick: buffer overflow of Comments
An attacker can generate a buffer overflow of imagemagick, in order to trigger a denial of service, and possibly to execute code...
VMware ESX, ESXi: denial of service via NFC
An attacker can modify an exchange between VMware ESX/ESXi and a client, in order to trigger a denial of service...
libvirt: denial of service via virBitmapParse
An attacker can transmit a large bitmap to libvirt, in order to trigger a denial of service...
Cisco IOS XR: denial of service via RIPv2
An attacker can send a special RIPv2 packet to Cisco IOS XR, in order to trigger a denial of service...
WordPress Encrypted Blog: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Encrypted Blog, in order to execute JavaScript code in the context of the web site...
WordPress silverOrchid: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress silverOrchid, in order to execute JavaScript code in the context of the web site...
WordPress Wordfence: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Wordfence, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 392 393 394 395 396 397 398 399 400 402 404 405 406 407 408 409 410 411 412 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1060