The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft Exchange: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Exchange...
Windows Script: use after free
An attacker can use a freed memory area of Windows Script, in order to trigger a denial of service, and possibly to execute code...
Windows: code execution via WinVerifyTrust
An attacker can alter a valid signed file, without being noticed by WinVerifyTrust, in order to deceive the victim so it runs the program...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Firefox, Thunderbird, SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of Firefox, Thunderbird and SeaMonkey...
Adobe Shockwave Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Shockwave Player...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
SAP ERP: deleting Security Audit Log
An attacker can delete the Security Audit Log of SAP, in order to hide his activities...
SAP BOPF for ABAP: privilege escalation
An attacker can access to a user of SAP BOPF for ABAP, in order to escalate his privileges or to obtain sensitive information...
SAP Print and Output: privilege escalation
An attacker can access to a user of SAP Print and Output, in order to escalate his privileges or to obtain sensitive information...
SAP BusinessObjects Explorer: Cross Site Flashing of com_businessobjects_polestar_bootstrap.swf
An attacker can trigger a Cross Site Flashing in com_businessobjects_polestar_bootstrap.swf of SAP BusinessObjects Explorer, in order to execute JavaScript code in the context of the web site...
SAP BusinessObjects Explorer: information disclosure via Port Scanning
An attacker can use a Port Scanning on SAP BusinessObjects Explorer, in order to obtain sensitive information...
WordPress FormCraft: SQL injection
An attacker can use a SQL injection of WordPress FormCraft, in order to read or alter data...
WordPress photosmash: PHP code execution
An attacker can upload a PHP file via WordPress photosmash, in order to execute PHP code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 411 412 413 414 415 416 417 418 419 421 423 424 425 426 427 428 429 430 431 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1080