The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Windows: privilege elevation via AFD
A local attacker can create an error in Ancillary Function Driver in order to execute code with system privileges...
Windows: privilege escalation via On-Screen Keyboard
A local attacker can use the On-Screen Keyboard of Windows, in order to escalate his privileges...
Windows: code execution via Journal
An attacker can invite the victim to open a malicious Journal file on Windows, in order to execute code...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
SAP HANA: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of SAP HANA, in order to force the victim to perform operations...
WordPress Polylang: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Polylang, in order to execute JavaScript code in the context of the web site...
Joomla JChatSocial: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla JChatSocial, in order to execute JavaScript code in the context of the web site...
python-lz4: memory corruption
An attacker can generate a memory corruption of python-lz4, in order to trigger a denial of service, and possibly to execute code...
Horde: multiple vulnerabilities
An attacker can use several vulnerabilities of Horde...
Linux kernel: privilege escalation via ptrace SYSRET RIP
A local attacker can use ptrace, SYSRET and RIP on a Linux kernel installed on x86_64, in order to escalate his privileges...
McAfee Application Control: code execution
An attacker can create a malicious program, which is not detected by McAfee Application Control...
WordPress Plugins: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of several WordPress plugins, in order to execute JavaScript code in the context of the web site...
Cisco IOS XR: denial of service via Punt Policer
An attacker can send malicious packets to Cisco IOS XR, in order to trigger a denial of service in Punt Policer...
WordPress wp-ttisbdir: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress wp-ttisbdir, in order to execute JavaScript code in the context of the web site...
Drupal Pane: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Pane, in order to execute JavaScript code in the context of the web site...
Drupal Meta Tags Quick: two vulnerabilities
An attacker can use several vulnerabilities of Drupal Meta Tags Quick...
Drupal Node Access Keys: information disclosure
An attacker can use Drupal Node Access Keys, in order to obtain sensitive information...
HP SiteScope: privilege escalation
A remote attacker can bypass the HP SiteScope authentication, in order to escalate his privileges...
Varnish: denial of service via Vary
An attacker, who is located behind Varnish, can send a malicious Vary header to Varnish, in order to trigger a denial of service...
Fine Free file: denial of service via awk BEGIN
An attacker can invite the victim to analyze a large file with Fine Free file, in order to trigger a denial of service during the AWK format detection...
dbus-daemon: two vulnerabilities
An attacker can use several vulnerabilities of dbus-daemon...
LZ4 Core: buffer overflow
An attacker can generate a buffer overflow of LZ4 Core, in order to trigger a denial of service, and possibly to execute code...
WordPress MailPoet: file upload
An attacker can upload a malicious file on WordPress MailPoet, in order for example to upload a Trojan...
WordPress fbpromotions: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress fbpromotions, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 447 448 449 450 451 452 453 454 455 457 459 460 461 462 463 464 465 466 467 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114