The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to execute JavaScript code in the context of the web site...
2 FortiNet FortiGate: Man-in-the-middle via Anonymous Ciphers on FortiManager Service
An attacker can act as a Man-in-the-middle with FortiNet FortiGate FortiManager Service, in order to interact with user's session...
1 Drupal Commerce: email address disclosure
An attacker can read some email addresses of Drupal Commerce, in order to obtain sensitive information...
2 Drupal Custom BreadCrumbs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Custom BreadCrumbs, in order to execute JavaScript code in the context of the web site...
2 Drupal Ubercart: information disclosure via Order History
An attacker can read the Order History of Drupal Ubercart, in order to obtain sensitive information...
2 OSSEC host-deny.sh: file corruption via /tmp/hosts.deny.$$
A local attacker can create a symbolic link named /tmp/hosts.deny.$$, in order to alter the pointed file, with privileges of OSSEC host-deny.sh...
2 Junos Pulse SSL VPN: clickjacking
An attacker can trigger a clickjacking on Junos Pulse SSL VPN, in order to force the victim to perform unwanted operations...
2 Junos Pulse SSL VPN: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Junos Pulse SSL VPN, in order to execute JavaScript code in the context of the web site...
2 Junos Pulse SSL VPN/UAC: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Junos Pulse SSL VPN/UAC, in order to execute JavaScript code in the context of the web site...
2 MySQL: file corruption via MyISAM
A local attacker can create a symbolic link, in order for example to alter the /var/lib/mysql/my.cnf file, with privileges of MySQL...
3 Apache Tomcat: file upload via JSP
An attacker can upload a malicious file via JSP on Apache Tomcat, in order for example to upload a Trojan...
2 cURL: two vulnerabilities of cookies
The cURL program can send some user cookies to an attacker owning a malicious web site...
2 WordPress Wordfence Security: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Wordfence Security, in order to execute JavaScript code in the context of the web site...
2 WordPress WordPress Download Manager: privilege escalation
An attacker can use WordPress WordPress Download Manager, in order to create or delete files...
2 WordPress W3 Total Cache: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress W3 Total Cache, in order to force the victim to perform operations...
2 WordPress TinyMCE Advanced: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress TinyMCE Advanced, in order to force the victim to perform operations...
2 WordPress Xhanch My Twitter: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Xhanch My Twitter, in order to force the victim to perform operations...
2 WordPress WP to Twitter: sending Tweets
An attacker can use WordPress WP to Twitter, in order to send spoofed Tweets...
2 WordPress Contact Form: email header injection
An attacker can use WordPress Contact Form, in order to inject a header in an email...
2 WordPress Ninja Forms: privilege escalation
An attacker can use WordPress Ninja Forms, in order to delete a form...
3 HP Network Node Manager I: buffer overflow of ovopi.dll
An attacker can generate a buffer overflow in ovopi.dll of HP Network Node Manager I, in order to trigger a denial of service, and possibly to execute code...
1 Linux kernel: NULL pointer dereference via VxLAN
An attacker can force a NULL pointer to be dereferenced via a VxLAN interface of the Linux kernel, in order to trigger a denial of service...
2 Linux kernel: use after free via futex_wait
A local attacker can force the usage a freed memory area in the futex_wait() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code...
3 Microsoft Lync: multiple vulnerabilities
An attacker can use several vulnerabilities of Microsoft Lync...
2 Windows: privilege escalation via Task Scheduler
A local attacker can use the Task Scheduler of Windows, in order to escalate his privileges...
3 Microsoft .NET: denial of service via hash collision
An attacker can send special queries to a service using Microsoft .NET, in order to trigger a denial of service...
4 Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3 Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 458 459 460 461 462 463 464 465 466 468 470 471 472 473 474 475 476 477 478 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 995