The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WordPress NextGEN Gallery: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress NextGEN Gallery, in order to run JavaScript code in the context of the web site...
WordPress Blubrry PowerPress Podcasting: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Blubrry PowerPress Podcasting, in order to run JavaScript code in the context of the web site...
WordPress BulletProof Security: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress BulletProof Security, in order to run JavaScript code in the context of the web site...
WordPress Fast Secure Contact Form: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Fast Secure Contact Form, in order to run JavaScript code in the context of the web site...
Cisco Secure ACS: Cross Site Scripting of DOM
An attacker can trigger a Cross Site Scripting in DOM of Cisco Secure ACS, in order to run JavaScript code in the context of the web site...
Cisco Secure ACS: privilege escalation via Report Generation
An authenticated attacker can create a report on Cisco Secure ACS, in order to escalate his privileges...
Cisco Secure ACS: privilege escalation via Dashboard/Portlet
An attacker can bypass restrictions in Dashboard/Portlet of Cisco Secure ACS, in order to escalate his privileges...
Cisco Secure ACS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Secure ACS, in order to run JavaScript code in the context of the web site...
Dotclear: two vulnerabilities
An attacker can use several vulnerabilities of Dotclear...
WordPress wp-championship: SQL injection
An attacker can use a SQL injection of WordPress wp-championship, in order to read or alter data...
Drupal Active Tags: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Active Tags, in order to run JavaScript code in the context of the web site...
PolarSSL, mbed TLS: buffer overflow of Ticket/SNI
An attacker can generate a buffer overflow in Ticket/SNI of PolarSSL and mbed TLS, in order to trigger a denial of service, and possibly to run code...
BusyBox: buffer overflow of httpd
An attacker can generate a buffer overflow in the httpd service of BusyBox, in order to trigger a denial of service, and possibly to run code...
libpng: unreachable memory reading via png_convert_to_rfc1123
An attacker can force a read at an invalid address in the png_convert_to_rfc1123() function of libpng, in order to trigger a denial of service...
BusyBox: unreachable memory reading via ZIP
An attacker can force a read at an invalid address with a ZIP archive on BusyBox, in order to trigger a denial of service...
phpMyAdmin: content injection via url.php
An attacker can inject text in a page of the phpMyAdmin web site, in order to deceive some visitors...
IBM Domino: two vulnerabilities of GIF
An attacker can use several vulnerabilities of GIF of IBM Domino...
Openstack Ironic Discoverd: code execution via Debug
An attacker can use a vulnerability in Debug of Openstack Ironic Discoverd, in order to run code...
Siemens ROS: information disclosure from VLANs
An attacker can read padding bytes sent by Siemens ROS, in order to obtain sensitive information belonging to another VLANs...
Joomla Core: five vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
IBM HTTP Server: buffer overflow
An attacker can generate a buffer overflow of IBM HTTP Server, in order to trigger a denial of service, and possibly to run code...
Bouncy Castle, Oracle Java: disclosure of elliptic curve private keys
An attacker can use a vulnerability in the elliptic curve implementation of Bouncy Castle and Oracle Java, in order to obtain sensitive information...
Drupal Webform CiviCRM Integration: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Webform CiviCRM Integration, in order to run JavaScript code in the context of the web site...
Drupal LABjs: open redirect
An attacker can deceive the user of Drupal LABjs, in order to redirect him to a malicious site...
Drupal jQuery Update: open redirect
An attacker can deceive the user of Drupal jQuery Update, in order to redirect him to a malicious site...
Drupal Core: open redirect of Overlay
An attacker can deceive the user of Overlay of Drupal Core, in order to redirect him to a malicious site...
NTP.org: multiple vulnerabilities
An attacker can use several vulnerabilities of NTP.org...
Cisco ASA: denial of service via ISAKMP
An attacker can send a malicious ISAKMP packet to Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via DNS
An attacker can send a malicious DNS packet to Cisco ASA, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 553 554 555 556 557 558 559 560 561 563 565 566 567 568 569 570 571 572 573 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021