The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
BlackBerry Enterprise Service: code execution via Universal Device Service
An attacker can upload a Java package on the BlackBerry Enterprise Service server, in order to execute code with administrative privileges...
WordPress Quick Contact Form: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Quick Contact Form, in order to execute JavaScript code in the context of the web site...
X.Org: use after free via doImageText
An attacker can use a freed memory area in the doImageText() function of X.Org, in order to trigger a denial of service, and possibly to execute code with root privileges...
Microsoft Silverlight: information disclosure
A malicious application can force Microsoft Silverlight to use an invalid pointer, in order to obtain sensitive information...
Word: two vulnerabilities
An attacker can invite the victim to open a malicious file with Word, in order to execute code on his computer...
Excel: two vulnerabilities
An attacker can invite the victim to open a malicious file with Excel, in order to execute code on his computer...
Microsoft SharePoint: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft SharePoint...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Windows, ASP.NET: code execution via Common Control Library
An attacker can generate an integer overflow in the Common Control Library of Windows, in order to trigger a denial of service, and possibly to execute code in ASP.NET for example...
Microsoft .NET: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft .NET...
Windows: multiple vulnerabilities of Kernel Driver
An attacker can use several vulnerabilities of Kernel Driver of Windows...
WordPress BP Group Documents: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress BP Group Documents, in order to execute JavaScript code in the context of the web site...
Adobe Acrobat/Reader: code execution via JavaScript URI
An attacker can invite the victim to open a malicious PDF document on Windows, in order to execute JavaScript code in the context of the web browser...
Apache httpd: buffer overflow of mod_fcgid
An attacker can generate a buffer overflow in mod_fcgid of Apache httpd, in order to trigger a denial of service, and possibly to execute code...
SAP HANA: information disclosure via ICM
An attacker can send a query to the ICM process of SAP HANA, in order to obtain sensitive information...
WordPress Woopra Analytics Plugin: PHP code execution
An attacker can send a POST query to the WordPress Woopra Analytics Plugin, in order to execute PHP code...
HttpClient: man in the middle of SSL
An attacker can act as a Man in the middle in the SSL/TLS session of HttpClient, in order to capture sensitive information...
Perl HTTP-Body-Multipart: command injection
An attacker can use a special filename, which is not filtered by Perl HTTP::Body::Multipart, in order to execute shell commands...
Cisco IOS: denial of service via DHCP Remember
An attacker can use the Remember feature of the DHCP server of Cisco IOS, in order to trigger a denial of service...
WordPress Events Manager: Cross Site Scripting of Booking Form
An attacker can trigger a Cross Site Scripting in Booking Form of WordPress Events Manager, in order to execute JavaScript code in the context of the web site...
Cisco NX-OS: script creation
A local attacker can indicate a special filename, in order to force Cisco NX-OS to create a script on the system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 399 400 401 402 403 404 405 406 407 409 411 412 413 414 415 416 417 418 419 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1058