The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Adobe Reader, Acrobat: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Reader, Acrobat...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
libXfont: multiple vulnerabilities
An attacker can use several vulnerabilities of libXfont...
SAP NetWeaver: information disclosure via SAP CUA
An attacker can read SAP CUA tables of SAP NetWeaver, in order to obtain sensitive information...
SAP HANA: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SAP HANA, in order to execute JavaScript code in the context of the web site...
SAP: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of SAP, in order to execute JavaScript code in the context of the web site...
QEMU: integer overflow of qcow1 L1
An attacker can generate an integer overflow in QEMU via qcow1, in order to trigger a denial of service, and possibly to execute code...
QEMU: integer overflow of qcow1 L2
An attacker can generate an integer overflow in QEMU via qcow1, in order to trigger a denial of service, and possibly to execute code...
QEMU: buffer overflow of usb_device_post_load
An attacker can generate a buffer overflow in the usb_device_post_load() function of QEMU, in order to trigger a denial of service, and possibly to execute code...
WordPress Bonuspressx: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Bonuspressx, in order to execute JavaScript code in the context of the web site...
WordPress TinyMCE Color Picker: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress TinyMCE Color Picker, in order to force the victim to perform operations...
WordPress Profile Builder: changing password
An attacker can use wppb.recover.password.php of WordPress Profile Builder, in order to change the password of a user...
WordPress Contact Bank: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Contact Bank, in order to execute JavaScript code in the context of the web site...
Splunk: Cross Site Scripting of CSV File Upload
An attacker can trigger a Cross Site Scripting in CSV File Upload of Splunk, in order to execute JavaScript code in the context of the web site...
Joomla YEEditor: vulnerability
A vulnerability of Joomla YEEditor was announced...
WebSphere AS: denial of service via Heartbeat
An attacker can send TLS Heartbeat messages to WebSphere AS, in order to trigger a denial of service...
Novell Client for Linux on OES11 SP2: privilege escalation via nwrights
A local attacker can use a file, with rights granted by nwrights, in order to escalate his privileges...
Bind 9.10: denial of service via pre-fetch
An attacker can setup a malicious DNS server, and then invite internal users to query Bind 9.10, and then reply to the pre-fetch query, in order to trigger a denial of service...
HP NNMi: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HP NNMi, in order to execute JavaScript code in the context of the web site...
HP Switch: information disclosure via Fibre Channel
An attacker can use a vulnerability of HP H-series Fibre Channel Switches, in order to obtain sensitive information...
F5 BIG-IP: code execution via iControl
An attacker, authenticated as administrator, can use iControl of F5 BIG-IP, in order to execute shell code...
Drupal Flag: code execution via Importer
An attacker can use the import feature of Drupal Flag, in order to execute PHP code...
Drupal Organic Groups: privilege escalation
An attacker can bypass access restrictions of Drupal Organic Groups, in order to escalate his privileges...
Linux kernel: information disclosure via raw_cmd_copyin
A local attacker can call the FDRAWCMD ioctl, in order to obtain memory addresses of the Linux kernel, in order to bypass ASLR...
Linux kernel: information disclosure via raw_cmd_copyout
A local attacker can call the FDRAWCMD ioctl, in order to obtain memory addresses of the Linux kernel, in order to bypass ASLR...
ClamAV: denial of service via PE Icons
An attacker can create a malicious PE file, and then send it to ClamAV, in order to trigger a denial of service...
Linux kernel: denial of service via BPF_S_ANC_NLATTR
A local attacker can create a BPF filter using BPF_S_ANC_NLATTR, in order to trigger a denial of service...
WordPress photo-gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress photo-gallery, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 438 439 440 441 442 443 444 445 446 448 450 451 452 453 454 455 456 457 458 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114