History of vulnerabilities analyzed by Vigil@nce: Microsoft Exchange: two vulnerabilities An attacker can use several vulnerabilities of Microsoft Exchange... Windows Script: use after free An attacker can use a freed memory area of Windows Script, in order to trigger a denial of service, and possibly to execute code... Windows: code execution via WinVerifyTrust An attacker can alter a valid signed file, without being noticed by WinVerifyTrust, in order to deceive the victim so it runs the program... Internet Explorer: multiple vulnerabilities An attacker can use several vulnerabilities of Internet Explorer... Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey... Adobe Shockwave Player: multiple vulnerabilities An attacker can use several vulnerabilities of Adobe Shockwave Player... Adobe Flash Player: multiple vulnerabilities An attacker can use several vulnerabilities of Adobe Flash Player... SAP ERP: deleting Security Audit Log An attacker can delete the Security Audit Log of SAP, in order to hide his activities... SAP BOPF for ABAP: privilege escalation An attacker can access to a user of SAP BOPF for ABAP, in order to escalate his privileges or to obtain sensitive information... SAP Print and Output: privilege escalation An attacker can access to a user of SAP Print and Output, in order to escalate his privileges or to obtain sensitive information... SAP BusinessObjects Explorer: Cross Site Flashing of com_businessobjects_polestar_bootstrap.swf An attacker can trigger a Cross Site Flashing in com_businessobjects_polestar_bootstrap.swf of SAP BusinessObjects Explorer, in order to execute JavaScript code in the context of the web site... SAP BusinessObjects Explorer: information disclosure via Port Scanning An attacker can use a Port Scanning on SAP BusinessObjects Explorer, in order to obtain sensitive information... WordPress FormCraft: SQL injection An attacker can use a SQL injection of WordPress FormCraft, in order to read or alter data... WordPress photosmash: PHP code execution An attacker can upload a PHP file via WordPress photosmash, in order to execute PHP code... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104