The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Simple Cu3er: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Simple Cu3er, in order to execute JavaScript code in the context of the web site...
WordPress NextGen Cu3er Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress NextGen Cu3er Gallery, in order to execute JavaScript code in the context of the web site...
IIS 4, 5: altering the CGI environment
An attacker can alter environment variables used by CGI scripts installed on IIS 4/5, in order to alter their behavior...
Nagios: shell command execution via NRPE
An attacker can request Nagios NRPE to execute a plugin with a special parameter, in order to execute a shell command on the server...
json-c: two vulnerabilities
An attacker can use several vulnerabilities of json-c...
WordPress SEO Plugin LiveOptim: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress SEO Plugin LiveOptim, in order to force the victim to perform operations...
Openfire: denial of service via XMPP
An attacker can generate a highly compressed XMPP message, and then send it to Openfire, in order to trigger a denial of service...
Drupal core: information disclosure via Form State
An attacker can use forms of modules using the Form State API, in order to obtain sensitive information...
Drupal Block Search: SQL injection
An attacker can use a SQL injection of Drupal Block Search, in order to read or alter data...
Bouncy Castle: bypassing TLS Server client-auth
An attacker can offer an invalid client certificate to the DTSL/TLS server of Bouncy Castle, in order to bypass the authentication...
Joomla com_wrapper: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla com_wrapper, in order to execute JavaScript code in the context of the web site...
Joomla com_smf: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla com_smf, in order to execute JavaScript code in the context of the web site...
HP NNMi: code execution
A remote attacker can use a vulnerability of HP NNMi, in order to execute code...
Qemu: integer overflow of virtio_net_handle_mac
An attacker can generate an integer overflow in the virtio_net_handle_mac() function of Qemu, in order to trigger a denial of service, and possibly to execute code...
Qemu: memory corruption via IDE SMART
An attacker, located in a guest system, can generate a memory corruption via IDE SMART of Qemu, in order to trigger a denial of service on the host, and possibly to execute code...
Linux kernel: hijacking execution via bpf_jit
An attacker can create a special BPF filter, to hijack the execution of the Linux kernel BPF JIT compiler, in order to trigger a denial of service, and possibly to execute code...
Zend Framework: Cross Site Scripting of escapeHtml
An attacker can trigger a Cross Site Scripting in escapeHtml of Zend Framework, in order to execute JavaScript code in the context of the web site...
MySQL: several vulnerabilities of April 2014
Several vulnerabilities of Oracle MySQL were announced in April 2014...
Solaris: several vulnerabilities of April 2014
Several vulnerabilities of Oracle Solaris were announced in April 2014...
Oracle Fusion: several vulnerabilities of April 2014
Several vulnerabilities of Oracle Fusion were announced in April 2014...
Oracle Java: multiple vulnerabilities of April 2014
An attacker can use several vulnerabilities of Oracle Java...
Oracle Database: several vulnerabilities of April 2014
Several vulnerabilities of Oracle Database were announced in April 2014...
Joomla com_beacondecode: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla com_beacondecode, in order to execute JavaScript code in the context of the web site...
Joomla com_ewriting: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla com_ewriting, in order to execute JavaScript code in the context of the web site...
TrueCrypt: multiple vulnerabilities
An attacker can use several vulnerabilities of TrueCrypt...
strongSwan: bypassing authentication via IKEv2
An attacker can regenerate keys of strongSwan with IKEv2, in order to bypass the authentication...
WordPress LineNity: directory traversal
An attacker can traverse directories of WordPress LineNity, in order to read a file outside the service root path...
Joomla JoomShopping: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla JoomShopping, in order to execute JavaScript code in the context of the web site...
WordPress HK Exif Tags: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress HK Exif Tags, in order to execute JavaScript code in the context of the web site...
WordPress Jetpack: privilege escalation via XML-RPC
An attacker can use XML-RPC of WordPress Jetpack, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 434 435 436 437 438 439 440 441 442 444 446 447 448 449 450 451 452 453 454 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102