The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Node basket: two vulnerabilities
An attacker can use several vulnerabilities of Drupal Node basket...
Drupal Feature Set: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Feature Set, in order to force the victim to perform operations...
Drupal Webform prepopulate block: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Webform prepopulate block, in order to execute JavaScript code in the context of the web site...
Drupal Views: two vulnerabilities
An attacker can use several vulnerabilities of Drupal Views...
WordPress Ninja Forms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ninja Forms, in order to execute JavaScript code in the context of the web site...
Cisco Secure Access Control System: SQL injection
An attacker can use a SQL injection of Cisco Secure Access Control System, in order to read or alter data...
Puppet Enterprise: information disclosure via Amazon EC2
An attacker can read Amazon EC2 data via Puppet Enterprise, in order to obtain sensitive information...
Cisco IOS: denial of service via MACE/CEF
An attacker can send numerous packets to Cisco IOS with CEF and MACE, in order to trigger a denial of service...
Cisco IOS: denial of service via MACE/CEF
An attacker can send numerous packets to Cisco IOS with CEF and MACE, in order to trigger a denial of service...
Cisco IOS: bypassing ACL via Process/CEF Switching
An attacker can send numerous packets to Cisco IOS with CEF, in order to bypass an ACL...
X.Org Server: information disclosure via XkbSetGeometry
A local attacker can read a memory fragment via XkbSetGeometry on X.Org Server, in order to obtain sensitive information...
Microsoft System Center: privilege escalation via VMM User Role
An attacker can use Microsoft System Center VMM, in order to escalate his privileges...
Windows: information disclosure via TIFF
An attacker can read a memory fragment of Windows via a TIFF image, in order to obtain sensitive information...
Windows: privilege escalation via Create Process
A local attacker can use the CreateProcess() function on Windows, in order to escalate his privileges...
Windows: bypassing Group Policy
An attacker can alter the Group Policy of Windows, in order to bypass the domain security policy...
Microsoft Office: bypassing ASLR
An attacker can bypass ASLR via Microsoft Office, in order to ease the exploitation of another vulnerability...
Microsoft Office: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
Windows: code execution via Domain Group Policy
An attacker can use a malicious Group Policy, in order to execute code on Windows systems configured for a domain and connecting to another domain...
Windows: multiple vulnerabilities of Kernel-Mode Driver
An attacker can use several vulnerabilities of Kernel-Mode Driver of Windows...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
CUPS: buffer overflow of cupsRasterReadPixels
An attacker can generate a buffer overflow in the cupsRasterReadPixels() function of CUPS, in order to trigger a denial of service, and possibly to execute code...
WordPress WPLMS: privilege escalation via admin-ajax.php
An attacker can use admin-ajax.php of WordPress WPLMS, in order to escalate his privileges...
WordPress Spider Facebook: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Spider Facebook, in order to execute JavaScript code in the context of the web site...
WordPress Redirection Page: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Redirection Page, in order to execute JavaScript code in the context of the web site...
WordPress Mobile Domain: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Mobile Domain, in order to execute JavaScript code in the context of the web site...
WordPress Google Doc Embedder: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Google Doc Embedder, in order to execute JavaScript code in the context of the web site...
WordPress Cross Slide: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Cross Slide, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 486 487 488 489 490 491 492 493 494 496 498 499 500 501 502 503 504 505 506 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022