The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress Easy Media Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easy Media Gallery, in order to run JavaScript code in the context of the web site...
WordPress eShop: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress eShop, in order to run JavaScript code in the context of the web site...
WordPress WP Limit Login Attempts: SQL injection
An attacker can use a SQL injection of WordPress WP Limit Login Attempts, in order to read or alter data...
WordPress SecurityMoz Security Audit: code execution via unserialize
An attacker can act as a Man-in-the-middle on WordPress SecurityMoz Security Audit, in order to run code...
QEMU: infinite loop of e1000
An attacker, who is privileged in a guest system, can generate an infinite loop in e1000 of QEMU, in order to trigger a denial of service on the host system...
Ganglia Web: privilege escalation via Cookie
An attacker can use a Cookie containing a serialized boolean to bypass the authentication of Ganglia Web, in order to escalate his privileges...
Tor: information disclosure via SafeLogging
An attacker can bypass access restrictions to data in SafeLogging of Tor, in order to obtain sensitive information...
Webroot SecureAnywhere Mobile Protection: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Webroot SecureAnywhere Mobile Protection, in order to read or write data in the session...
PHP: eight vulnerabilities
An attacker can use several vulnerabilities of PHP...
Mozilla NSS: update of the certification authority list
The security of Mozilla NSS was improved with an updated list of CA certificates...
Windows 7: bypassing UAC
An attacker can invite the victim to execute a malicious cscript/wscript script on Windows 7, which does not generate a warning message before gaining administration privileges. The victim can thus imagine that the script only ran with his user privileges...
screen: buffer overflow
An attacker can generate a buffer overflow of screen, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: privilege escalation via iCall
A privileged attacker can use iCall of F5 BIG-IP, in order to escalate his privileges...
OpenSLP: denial of service
An attacker can generate a fatal error of OpenSLP, in order to trigger a denial of service...
libvdpau: three vulnerabilities
An attacker can use several vulnerabilities of libvdpau...
MediaWiki: multiple vulnerabilities
An attacker can use several vulnerabilities of MediaWiki...
SeaMonkey: multiple vulnerabilities
An attacker can use several vulnerabilities of SeaMonkey...
OpenShift: denial of service
An attacker can generate a fatal error of OpenShift, in order to trigger a denial of service...
OpenStack Compute/Nova: denial of service
An attacker can generate a fatal error of OpenStack Compute/Nova, in order to trigger a denial of service...
Spice: memory corruption via worker_update_monitors_config
An attacker can generate a memory corruption in worker_update_monitors_config of Spice, in order to trigger a denial of service, and possibly to run code...
Joomla JEvents: SQL injection
An attacker can use a SQL injection of Joomla JEvents, in order to read or alter data...
Symantec Ghost Explorer: information disclosure
An attacker can use a vulnerability of Symantec Ghost Explorer, in order to obtain sensitive information...
WordPress MDC Private Message: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress MDC Private Message, in order to run JavaScript code in the context of the web site...
QEMU: denial of service via VNC_MSG_CLIENT_CUT_TEXT
An attacker, who is privileged in a guest system, can send the VNC_MSG_CLIENT_CUT_TEXT message to QEMU, in order to trigger a denial of service on the host system...
Drupal Fieldable Panels Panels: read-write access
An attacker can bypass access restrictions of Drupal Fieldable Panels Panels, in order to read or alter data...
Drupal Mass Contact: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Mass Contact, in order to run JavaScript code in the context of the web site...
PowerDNS: denial of service
An attacker can generate a fatal error of PowerDNS, in order to trigger a denial of service...
Drupal Zendesk Feedback Tab: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Zendesk Feedback Tab, in order to run JavaScript code in the context of the web site...
Drupal Spotlight: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Spotlight, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 542 543 544 545 546 547 548 549 551 553 554 555 556 557 558 559 560 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020