The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 F5 BIG-IP APM: Clickjacking of Access Policy Logon
An attacker can trigger a Clickjacking in Access Policy Logon of F5 BIG-IP APM, in order to perform operations in the context of the web site...
2 WordPress RokIntroScroller: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress RokIntroScroller...
2 WordPress Complete Gallery Manager: file upload
An attacker can upload a malicious file on WordPress Complete Gallery Manager, in order for example to upload a PHP code...
2 Drupal Google Site Search: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Google Site Search, in order to execute JavaScript code in the context of the web site...
3 Cisco Prime Data Center Network Manager: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco Prime Data Center Network Manager...
3 Cisco Prime Central for Hosted Collaboration Solution Assurance: password disclosure
An unauthenticated attacker can use Cisco Prime Central for Hosted Collaboration Solution Assurance, in order to obtain the list of logins and passwords...
3 IBM Domino: buffer overflow of iNotes
An attacker can generate a buffer overflow in iNotes of IBM Domino, in order to trigger a denial of service, and possibly to execute code...
2 Poppler: denial of service via DCTStream
An attacker can create a PDF document containing a malformed JPEG image, to generate an error in the DCTStream of Poppler, in order to trigger a denial of service...
2 WordPress RokNewsPager: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress RokNewsPager...
2 WordPress RokStories: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress RokStories...
4 Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
4 Internet Explorer: use after free via SetMouseCapture
An attacker can use a freed memory area in SetMouseCapture() of Internet Explorer, in order to trigger a denial of service, and possibly to execute code...
2 Cisco NX-OS: denial of service via BGP Regex
An attacker can send a BGP packet with a specific Autonomous System to generate an error in the regular expression management of Cisco NX-OS, in order to trigger a denial of service...
2 vtiger CRM: SQL injection of CalendarCommon.php
An attacker can use a SQL injection in CalendarCommon.php of vtiger CRM, in order to read or alter data...
2 WordPress Mukioplayer: SQL injection
An attacker can use a SQL injection of WordPress Mukioplayer, in order to read or alter data...
2 WordPress Simple Dropbox Upload: code execution
An attacker can upload a PHP file with WordPress Simple Dropbox Upload, in order to execute code...
2 FFmpeg: buffer overflow via SPS
An attacker can create a malicious video, and invite the victim to display it with an application linked to FFmpeg, in order to stop it or to execute code on his computer...
2 Cisco Unified MeetingPlace Application Server: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified MeetingPlace Application Server, in order to execute JavaScript code in the context of the web site...
2 Cisco NX-OS: denial of service via ONEP
An attacker can send a malicious ONEP packet to Cisco NX-OS, in order to trigger a denial of service...
2 Linux kernel: information disclosure via SCTP IPv6
An attacker can capture SCTP packets, in order to obtain sensitive IPv6 information which should be encrypted...
1 GnuPG: information disclosure via no-usage-permitted
When a key is tagged as "no-usage-permitted", an attacker can force GnuPG to use it, in order to obtain sensitive information...
2 Cisco Unified MeetingPlace: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Unified MeetingPlace, in order to force the victim to perform operations...
2 Opera: Cross Site Scripting of UTF-8
An attacker can trigger a Cross Site Scripting when the page encoding is set to UTF-8 in Opera, in order to execute JavaScript code in the context of the web site...
1 Linux kernel: privilege escalation via TUNSETIFF
An attacker, who has the CAP_NET_ADMIN capability, can use the TUNSETIFF ioctl of the Linux kernel, in order to gain root privileges...
2 Linux kernel: multiple vulnerabilities of HID
An attacker can use several vulnerabilities in HID of the Linux kernel...
2 Cisco Prime LAN Management Solution: Cross Frame Scripting
An attacker can trigger a Cross Frame Scripting of Cisco Prime LAN Management Solution, in order to execute JavaScript code in the context of the web site...
2 XnView: vulnerability
A vulnerability was announced in XnView...
3 VMware ESX, ESXi: two vulnerabilities of CIM
An attacker can use several vulnerabilities of the CIM feature of VMware ESX/ESXi...
2 Drupal jQuery Countdown: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal jQuery Countdown, in order to execute JavaScript code in the context of the web site...
2 Drupal Click2Sell: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Click2Sell...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 395 396 397 398 399 400 401 402 403 405 407 408 409 410 411 412 413 414 415 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 995