The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress WassUp Real Time Analytics: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WassUp Real Time Analytics, in order to execute JavaScript code in the context of the web site...
WordPress WP Super Cache: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Super Cache, in order to execute JavaScript code in the context of the web site...
Firefox: two vulnerabilities
An attacker can use several vulnerabilities of Firefox...
WordPress All In One SEO Pack: information disclosure via META
An attacker can read the HTML Meta Description field of WordPress All In One SEO Pack documents, in order to obtain sensitive information...
Linux kernel: privilege escalation via Bind Mount
An attacker can use a Bind Mount on the Linux kernel, in order to escalate his privileges...
Linux kernel, FreeBSD: denial of service via IPv6 RA Hop Limit
An attacker on the LAN can spoof ICMPv6 RA packets with a low Hop Limit, in order to trigger a denial of service of the Linux or FreeBSD IPv6 stacks...
Cisco Nexus 9000: denial of service via SNMP
An attacker can use SNMP with Cisco Nexus 9000, in order to trigger a denial of service...
Cisco Catalyst 4500: denial of service via SNMP Polling
An attacker can use the SNMP Polling of Cisco Catalyst 4500, in order to trigger a denial of service...
WordPress Simple Ads Manager: three vulnerabilities
An attacker can use several vulnerabilities of WordPress Simple Ads Manager...
Symfony: two vulnerabilities
An attacker can use several vulnerabilities of Symfony...
WordPress Revolution Slider: file upload
An attacker can upload a malicious file on WordPress Revolution Slider, in order for example to upload a Trojan...
Joomla Simple Photo Gallery: file upload
An attacker can upload a malicious file on Joomla Simple Photo Gallery, in order for example to upload a Trojan...
WordPress DesignFolio+: file upload
An attacker can upload a malicious file on WordPress DesignFolio+, in order for example to upload a Trojan...
Chrome: two vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Linux kernel: privilege escalation via int80 fork
A local attacker can use an interruption 128 for the fork() system call on the Linux kernel, in order to escalate his privileges...
Drupal Open Graph Importer: write access
An attacker can bypass access restrictions of Drupal Open Graph Importer, in order to alter data...
Drupal Current Search Links: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Current Search Links, in order to execute JavaScript code in the context of the web site...
Drupal User Import: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal User Import, in order to force the victim to perform operations...
Drupal Password Policy: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Password Policy, in order to execute JavaScript code in the context of the web site...
Drupal EntityBulkDelete: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal EntityBulkDelete, in order to execute JavaScript code in the context of the web site...
Drupal Imagefield Info: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Imagefield Info, in order to execute JavaScript code in the context of the web site...
Cisco Prime Data Center Network Manager: directory traversal
An attacker can traverse directories of Cisco Prime Data Center Network Manager, in order to read a file outside the service root path...
Cisco Unity Connection: five vulnerabilities
An attacker can use several vulnerabilities of Cisco Unity Connection...
EMC PowerPath Virtual Appliance: undocumented accounts
An attacker can log in on two accounts created by EMC PowerPath Virtual Appliance, which can be used to obtain information about the system...
WordPress Favicon by RealFaviconGenerator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Favicon by RealFaviconGenerator, in order to execute JavaScript code in the context of the web site...
Cisco ASR 1000 Series: denial of service via Route Adjacencies
An attacker can send a malicious IP packet to Cisco ASR 1000 Series, in order to trigger a denial of service...
WordPress Ptengine: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Ptengine, in order to execute JavaScript code in the context of the web site...
WordPress WP Business Intelligence: SQL injection
An attacker can use a SQL injection of WordPress Business Intelligence, in order to read or alter data...
WordPress flashy: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress flashy, in order to execute JavaScript code in the context of the web site...
mDNS: information disclosure and DDos
An attacker can query the mDNS service, in order to obtain sensitive information about the network, or to amplify a denial of service attack...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 498 499 500 501 502 503 504 505 506 508 510 511 512 513 514 515 516 517 518 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104