The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Miniaudioplayer: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Miniaudioplayer, in order to execute JavaScript code in the context of the web site...
WordPress LBG Zoom In/Out Effect Slider: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress LBG Zoom In/Out Effect Slider, in order to execute JavaScript code in the context of the web site...
TYPO3 Extensions: multiple vulnerabilities
An attacker can use several vulnerabilities of TYPO3 extensions...
TYPO3 AWStats: vulnerability
A vulnerability of TYPO3 AWStats was announced...
TYPO3 Formhandler: SQL injection
An attacker can use a SQL injection of TYPO3 Formhandler, in order to read or alter data...
TYPO3 RealURL Speaking Paths: SQL injection
An attacker can use a SQL injection of TYPO3 RealURL Speaking Paths, in order to read or alter data...
TYPO3 Direct Mail: information disclosure
An attacker can use TYPO3 Direct Mail, in order to obtain sensitive information...
TYPO3 Apache Solr: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 Apache Solr, in order to execute JavaScript code in the context of the web site...
Xen: information disclosure via AVX/LWP
An attacker who is located in a guest system can use the XSAVE/XRSTOR instructions, to read the content of the AVX/LWP registers of Xen, in order to obtain sensitive information...
Splunk: code execution via Test Script
An authenticated attacker can use Splunk test scripts, in order to execute shell commands on the server...
Joomla JVideoClip: SQL injection
An attacker can use a SQL injection in JVideoClip of Joomla, in order to read or alter data...
WordPress Lazy SEO: file upload
An attacker can upload a malicious file on WordPress Lazy SEO, in order for example to upload a Trojan...
WordPress Bradesco Gateway: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Bradesco Gateway, in order to execute JavaScript code in the context of the web site...
Symfony: denial of service via FOSUserBundle
An attacker can use a very long password in FOSUserBundle of Symfony, in order to trigger a denial of service...
WordPress Comment Attachment: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Comment Attachment, in order to execute JavaScript code in the context of the web site...
libvirt: invalid pointer free via virFileNBDDeviceAssociate
An attacker can free an invalid pointer in the virFileNBDDeviceAssociate() function of libvirt, in order to trigger a denial of service, and possibly to execute code...
WordPress NOSpamPTI: SQL injection
An attacker can use a SQL injection of WordPress NOSpamPTI, in order to read or alter data...
IcedTea-Web: overflow of one byte
An attacker can generate an overflow of one byte in the IcedTea-Web plugin, in order to stop the web browser, and possibly to execute code...
Cisco IPS: denial of service via Authentication Manager
An attacker can lock the Authentication Manager of Cisco IPS, in order to trigger a denial of service...
WordPress Page Showcaser Boxes: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Page Showcaser Boxes, in order to execute JavaScript code in the context of the web site...
systemd: privilege escalation via polkit
A local attacker can use a vulnerability in polkit, used by systemd, in order to escalate his privileges...
rtkit: privilege escalation via polkit
A local attacker can use a vulnerability in polkit, used by rtkit, in order to escalate his privileges...
hplip: privilege escalation via polkit
A local attacker can use a vulnerability in polkit, used by hplip, in order to escalate his privileges...
spice-gtk: privilege escalation via polkit
A local attacker can use a vulnerability in polkit, used by spice-gtk, in order to escalate his privileges...
libvirt: privilege escalation via polkit
A local attacker can use a vulnerability in polkit, used by libvirt, in order to escalate his privileges...
polkit: privilege escalation
A local attacker can bypass the security policy of polkit, in order to escalate his privileges...
libvirt: invalid pointer free via remoteDispatchDomainMemoryStats
An attacker can free an invalid pointer in the remoteDispatchDomainMemoryStats() function of libvirt, in order to trigger a denial of service, and possibly to execute code...
F5 BIG-IP APM: Cross Site Scripting of Access Policy Logout
An attacker can trigger a Cross Site Scripting in the Access Policy Logout page of F5 BIG-IP APM, in order to execute JavaScript code in the context of the web site...
HP ArcSight ESM: Cross Site Scripting of Management Interface
An attacker can trigger a Cross Site Scripting in the Management Interface of HP ArcSight ESM, in order to execute JavaScript code in the context of the web site...
WordPress RokMicroNews: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress RokMicroNews...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 396 397 398 399 400 401 402 403 404 406 408 409 410 411 412 413 414 415 416 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090