The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Drupal Corner: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Corner, in order to force the victim to perform operations...
2 Drupal Shibboleth Authentication: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Shibboleth Authentication, in order to force the victim to perform operations...
2 Drupal Taxonews: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Taxonews, in order to execute JavaScript code in the context of the web site...
2 Drupal Quizzler: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Quizzler, in order to execute JavaScript code in the context of the web site...
2 Drupal Patterns: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Patterns, in order to force the victim to perform operations...
2 Drupal Alfresco: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Alfresco, in order to force the victim to perform operations...
2 Drupal Classified Ads: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Classified Ads, in order to execute JavaScript code in the context of the web site...
1 SIMATIC S7-1200: open redirect
An attacker can deceive the user of SIMATIC S7-1200, in order to redirect him to a malicious site...
2 Joomla jDownloads: SQL injection
An attacker can use a SQL injection of Joomla jDownloads, in order to read or alter data...
2 Jasig CAS Server: bypassing LDAP authentication via Wildcard
An attacker can use the wildcard character on Jasig CAS Server, in order to ease a brute force attack on the LDAP directory...
2 McAfee Email Gateway: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of McAfee Email Gateway, in order to execute JavaScript code in the context of the web site...
2 Joomla J2Store: SQL injection
An attacker can use a SQL injection of Joomla J2Store, in order to read or alter data...
2 VLC Player: multiple vulnerabilities
An attacker can use several vulnerabilities of VLC Player...
3 MySQL: several vulnerabilities of January 2015
Several vulnerabilities of Oracle MySQL were announced in January 2015...
2 Solaris: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Solaris were announced in January 2015...
3 Oracle Java: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Java were announced in January 2015...
3 Oracle Communications: several vulnerabilities of January 2015
Several vulnerabilities of Communications Fusion were announced in January 2015...
3 Oracle Fusion: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Fusion were announced in January 2015...
3 Oracle Database: several vulnerabilities of January 2015
Several vulnerabilities of Oracle Database were announced in January 2015...
2 WordPress WP eCommerce: two vulnerabilities
An attacker can use several vulnerabilities of WordPress WP eCommerce...
1 Linux kernel: information disclosure via evdev_handle_get_val
A local attacker can read a memory fragment via evdev_handle_get_val(), in order to obtain sensitive information of the Linux kernel...
2 Node.js sequelize: SQL injection
An attacker can use a SQL injection of Node.js sequelize, in order to read or alter data...
2 Joomla JEvents: two vulnerabilities
An attacker can use several vulnerabilities of Joomla JEvents...
2 Joomla Content Editor: file upload
An attacker can upload a malicious file on Joomla Content Editor, in order for example to upload a Trojan...
2 WordPress CIP4 Folder Download Widget: directory traversal
An attacker can traverse directories of WordPress CIP4 Folder Download Widget, in order to read a file outside the service root path...
2 WordPress Bretheon: directory traversal
An attacker can traverse directories of WordPress Bretheon, in order to read a file outside the service root path...
3 WordPress Pixabay Images: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Pixabay Images...
3 Apache Santuario XML Security for Java: incorrect check of Streaming XML Signature
An attacker can create a malicious XML document, which is accepted as correctly signed by StAX of Apache Santuario XML Security for Java...
2 WordPress Pie Register: privilege escalation
An attacker can use WordPress Pie Register, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 482 483 484 485 486 487 488 489 491 493 494 495 496 497 498 499 500 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996