The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Unified Contact Center Express: denial of service via API
An attacker can trigger a fatal error via API of Cisco Unified Contact Center Express, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via Tcl
An attacker can trigger a fatal error via Tcl of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: code execution via Tcl
An attacker can use a vulnerability via Tcl of Cisco IOS / IOS XE, in order to run code...
Cisco Nexus: denial of service via SXP
An attacker can trigger a fatal error via SXP of Cisco Nexus, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via SSH
An attacker can trigger a fatal error via SSH of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via SNMP
An attacker can trigger a fatal error via SNMP of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via SIP
An attacker can trigger a fatal error via SIP of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco Prime Infrastructure: SQL injection
An attacker can use a SQL injection of Cisco Prime Infrastructure, in order to read or alter data...
Cisco IOS XE: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco IOS XE...
Cisco Nexus: code execution via onePK
An attacker can use a vulnerability via onePK of Cisco Nexus, in order to run code...
Cisco IOS: privilege escalation via Cisco Industrial Routers Image Verification Bypass
An attacker can bypass restrictions via Cisco Industrial Routers Image Verification Bypass of Cisco IOS, in order to escalate his privileges...
Cisco IOS: privilege escalation via Cisco Industrial Routers Virtual Device Server
An attacker can bypass restrictions via Cisco Industrial Routers Virtual Device Server of Cisco IOS, in order to escalate his privileges...
Cisco IOS: code execution via Cisco Industrial Routers Virtual Device Server
An attacker can use a vulnerability via Cisco Industrial Routers Virtual Device Server of Cisco IOS, in order to run code...
Cisco IOS: code execution via Cisco Industrial Routers Virtual Device Server
An attacker can use a vulnerability via Cisco Industrial Routers Virtual Device Server of Cisco IOS, in order to run code...
Cisco IOS: code execution via Cisco Industrial Routers
An attacker can use a vulnerability via Cisco Industrial Routers of Cisco IOS, in order to run code...
Cisco IOS / IOS XE: denial of service via IKEv2
An attacker can trigger a fatal error via IKEv2 of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS XE: denial of service via Catalyst 9800 Series Wireless Controllers
An attacker can trigger a fatal error via Catalyst 9800 Series Wireless Controllers of Cisco IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via CIP
An attacker can trigger a fatal error via CIP of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS: privilege escalation via Catalyst 2960-L / CDB-8P
An attacker can bypass restrictions via Catalyst 2960-L / CDB-8P of Cisco IOS, in order to escalate his privileges...
Cisco IOS XE: privilege escalation via SD-WAN Software
An attacker can bypass restrictions via SD-WAN Software Authentication Bypass of Cisco IOS XE, in order to escalate his privileges...
Cisco ASR 920: denial of service via SNMP
An attacker can trigger a fatal error via SNMP of Cisco ASR 920, in order to trigger a denial of service...
Drupal Services: privilege escalation via Taxonomy Term
An attacker can bypass restrictions via Taxonomy Term of Drupal Services, in order to escalate his privileges...
Grafana: information disclosure via Avatar HTTP Scan
An attacker can bypass access restrictions to data via Avatar HTTP Scan of Grafana, in order to obtain sensitive information...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Django: two vulnerabilities
An attacker can use several vulnerabilities of Django...
Symfony: privilege escalation via AbstractToken-hasUserChanged
An attacker can bypass restrictions via AbstractToken::hasUserChanged() of Symfony, in order to escalate his privileges...
Grafana: Cross Site Scripting via Dashboard Settings
An attacker can trigger a Cross Site Scripting via Dashboard Settings of Grafana, in order to run JavaScript code in the context of the web site...
Grafana: Cross Site Scripting via Table Panel Set Column Styles
An attacker can trigger a Cross Site Scripting via Table Panel Set Column Styles of Grafana, in order to run JavaScript code in the context of the web site...
Grafana: Cross Site Scripting via Text Panel Set Options
An attacker can trigger a Cross Site Scripting via Text Panel Set Options of Grafana, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1028 1029 1030 1031 1032 1033 1034 1035 1036 1038