The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 Drupal MediaFront: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal MediaFront, in order to execute JavaScript code in the context of the web site...
3 WordPress: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress...
3 Juniper Junos Pulse SA, IVE, UAC: multiple vulnerabilities of OpenSSL
An attacker can use several vulnerabilities of OpenSSL of Junos Pulse Secure Access Service (IVE) and Junos Pulse Access Control Service (UAC)...
3 Juniper Junos Pulse SA, IVE, UAC: denial of service via SSL Acceleration Card
When a SSL Acceleration Card is installed on Junos Pulse Secure Access Service (IVE) and Junos Pulse Access Control Service (UAC), an attacker can send a malformed packet, in order to trigger a denial of service...
2 Juniper Junos Pulse SA, IVE: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Juniper Junos Pulse Secure Access, in order to execute JavaScript code in the context of the web site...
1 NetBSD: denial of service via BPF
A local attacker can define a short BPF buffer on NetBSD, in order to trigger a denial of service...
2 glibc: multiple vulnerabilities of Memory Allocator
An attacker can use several vulnerabilities of memory allocator functions of the glibc...
2 ProFTPD: denial of service via mod_sftp_pam
When mod_sftp_pam is enabled on ProFTPD, with a keyboard-interactive authentication, an attacker can send a special SSH packet, to force ProFTPD to allocate a large memory area, in order to trigger a denial of service...
3 Wireshark 1.8: multiple vulnerabilities of dissectors
An attacker can use several vulnerabilities of dissectors of Wireshark 1.8...
3 Wireshark 1.10: multiple vulnerabilities of dissectors
An attacker can use several vulnerabilities of dissectors of Wireshark 1.10...
2 Windows: denial of service of Active Directory
An attacker can send a LDAP query to the Active Directory of Windows, in order to trigger a denial of service...
2 Microsoft FrontPage: information disclosure via DTD Entities
An attacker can invite the victim to open a FrontPage document using DTD entities, in order to obtain the content of a file located on victim's computer...
2 Windows: use after free via Service Control Manager
A local attacker can use a freed memory area in the Service Control Manager of Windows, in order to trigger a denial of service, and possibly to execute code...
2 Windows: seven vulnerabilities of win32k.sys
An attacker can use several vulnerabilities of win32k.sys of Windows...
2 Microsoft Office: privilege escalation via Pinyin IME
On a Chinese system, a local attacker can use Pinyin IME of Microsoft Office, in order to escalate his privileges...
3 Microsoft Access: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Access...
3 Microsoft Excel: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Excel...
3 Microsoft Word: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office Word...
3 Windows: code execution via a theme
An attacker can invite the victim to load a malicious theme in Windows, in order to execute code...
4 Windows: memory corruption via OLE
An attacker can invite the victim to open a malicious document, to generate a memory corruption via OLE of Windows, in order to trigger a denial of service, and possibly to execute code...
4 Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
4 Microsoft Outlook: code execution via S/MIME
An attacker can send an email with an malicious S/MIME signature to a Microsoft Outlook user, in order to execute code...
4 Microsoft SharePoint Server: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft SharePoint Server...
4 Adobe Shockwave Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Shockwave Player...
4 Adobe Reader, Acrobat: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Reader et Acrobat...
4 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
3 SAP Financial Services: code execution via Statutory Reporting for Insurance
An attacker can trigger a code injection in Statutory Reporting for Insurance of SAP Financial Services, in order to execute code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 394 395 396 397 398 399 400 401 402 404 406 407 408 409 410 411 412 413 414 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 995