The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Joomla Core: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Core, in order to run JavaScript code in the context of the web site...
2 Cisco WSA: denial of service via DNS
An attacker can send numerous queries requiring a DNS resolution on Cisco WSA, in order to trigger a denial of service...
2 F5 BIG-IP: denial of service via TMM
An attacker can send a malicious fragmented packet to FastL4/TMM of F5 BIG-IP, in order to trigger a denial of service...
2 Cisco SMA: denial of service via Log Rollover
An attacker can generate an error in the Log Rollover of Cisco SMA, in order to trigger a denial of service...
1 phpMyAdmin: bypassing reCaptcha
An attacker can bypass reCaptcha of phpMyAdmin, in order to perform a brute-force attack...
3 Oxide: memory corruption via JavaScriptDialogManager
An attacker can generate a memory corruption in JavaScriptDialogManager of Oxide, in order to trigger a denial of service, and possibly to run code...
3 Google Android OS: multiple vulnerabilities of August 2015
An attacker can use several vulnerabilities of Android OS...
2 Windows Hyper-V: privilege escalation via ACL
An attacker can bypass ACLs of Windows Hyper-V, in order to allow unintended network traffic...
2 Microsoft Lync: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Lync...
2 Microsoft Exchange: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Exchange...
2 Windows: three vulnerabilities of Task Management
An attacker can use several vulnerabilities of Task Management of Windows...
3 Microsoft .NET: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft .NET...
3 Windows: code execution via Media Center Link
An attacker can invite the victim to open a malicious MCL file with Windows Media Center, in order to run code...
2 Microsoft SharePoint: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Microsoft SharePoint, in order to run JavaScript code in the context of the web site...
3 Microsoft Office, SharePoint: four vulnerabilities
Several vulnerabilities were announced in Microsoft Office et SharePoint...
3 Windows: five vulnerabilities of Journal
An attacker can use several vulnerabilities of Journal of Windows...
4 Windows, Office, Lync: multiple vulnerabilities of Graphics Component
Several vulnerabilities were announced in Windows, Office, and Lync...
2 Windows: denial of service via Active Directory
An authenticated attacker can create several machine accounts in the Active Directory of Windows, in order to trigger a denial of service...
4 Microsoft Edge: four vulnerabilities
An attacker can use several vulnerabilities of Microsoft Edge...
4 Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3 Adobe Shockwave Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Shockwave Player...
2 Joomla Master User: privilege escalation
An authenticated attacker can use Joomla Master User, in order to escalate his privileges...
2 TYPO3 Core: two vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Core...
2 RSA: private key computation via CRT
An attacker can exchange with an application not implementing the RSA-CRT protection, in order to progressively guess the private key...
3 Kaspersky Anti-Virus: privilege escalation
An attacker can use Kaspersky Anti-Virus, in order to escalate his privileges...
2 WordPress WP Symposium: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress WP Symposium, in order to run JavaScript code in the context of the web site...
2 WordPress Contact Form Generator: four vulnerabilities
An attacker can use several vulnerabilities of WordPress Contact Form Generator...
2 Synology DS/RS: two vulnerabilities
An attacker can use several vulnerabilities of Synology DS/RS...
2 Magento: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Magento, in order to force the victim to perform operations...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 542 543 544 545 546 547 548 549 550 552 554 555 556 557 558 559 560 561 562 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996