The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Joomla Spider FAQ Lite: SQL injection
An attacker can use a SQL injection of Joomla Spider FAQ Lite, in order to read or alter data...
2 Joomla Spider Catalog Lite: SQL injection
An attacker can use a SQL injection of Joomla Spider Catalog Lite, in order to read or alter data...
2 Joomla Spider Calendar Lite: SQL injection
An attacker can use a SQL injection of Joomla Spider Calendar Lite, in order to read or alter data...
2 Joomla JEmbedAll: SQL injection
An attacker can use a SQL injection of Joomla JEmbedAll, in order to read or alter data...
2 WordPress Corner Ad: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Corner Ad, in order to run JavaScript code in the context of the web site...
2 Microsoft Office PowerPoint: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office PowerPoint...
2 WebKit: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKit...
2 PostfixAdmin: denial of service via Delete Protected Aliases
An attacker can generate a fatal error via Delete Protected Aliases of PostfixAdmin, in order to trigger a denial of service...
2 OpenSSL: denial of service via the "Encrypt-Then-Mac" option
An attacker can change the state of the "Encrypt-Then-Mac" TLS option in a renegotiation with a server or client based on OpenSSL, in order to trigger a denial of service...
3 Trend Micro InterScan Web Security Suite: six vulnerabilities
An attacker can use several vulnerabilities of Trend Micro InterScan Web Security Suite...
1 Xen: memory leak via exclusive device management
An attacker able to reboot a guest system can create a memory leak in the host system when no device is exclusively allocated to this virtual machine for non virtualized I/O...
2 Cisco Secure Access Control System: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Secure Access Control System, in order to run JavaScript code in the context of the web site...
2 Cisco Secure Access Control System: external XML entity injection
An authenticated attacker can transmit malicious XML data to Cisco Secure Access Control System, in order to read a file, scan sites, or trigger a denial of service...
1 Cisco Secure Access Control System: open redirect
An attacker can deceive the user of Cisco Secure Access Control System, in order to redirect him to a malicious site...
2 Avast: denial of service via aswSp.sys
An attacker can generate a fatal error via aswSp.sys of Avast, in order to trigger a denial of service...
3 Cisco Secure Access Control System: password disclosure in the configuration interface
An attacker can access to parameter view pages of the Web interface of Cisco Secure Access Control System, in order to obtain sensitive information...
2 Cisco AsyncOS: filtering bypass via MIME typing
An attacker can tamper with MIME headers in SMTP and HTTP connections filtered by Cisco AsyncOS, in order to bypass the content filtering...
2 Drupal Metatag: information disclosure
An attacker can bypass access restrictions to data of Drupal Metatag, in order to obtain sensitive information...
2 Cisco Prime Collaboration Assurance: file download
An attacker can traverse directories of Cisco Prime Collaboration Assurance, in order to read a file outside the service root path...
2 Drupal RESTful: privilege escalation
An attacker can bypass restrictions of Drupal RESTful, in order to escalate his privileges...
2 Cisco Prime Collaboration Assurance: directory traversal
An attacker can traverse directories of Cisco Prime Collaboration Assurance, in order to read a file outside the service root path...
2 Drupal Flag Clear: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Drupal Flag Clear, in order to force the victim to perform operations...
2 Drupal Search API Sorts: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Search API Sorts, in order to run JavaScript code in the context of the web site...
2 Drupal Hotjar: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Hotjar, in order to run JavaScript code in the context of the web site...
2 Cisco Prime Collaboration Assurance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Collaboration Assurance, in order to run JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: directory traversal
An authenticated attacker can traverse directories of Cisco Unified Communications Manager, in order to read a file outside the service root path...
2 Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
2 Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 676 677 678 679 680 681 682 683 684 686 688 689 690 691 692 693 694 695 696 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 993