History of vulnerabilities analyzed by Vigil@nce: FreeRADIUS: bad logging via Global Logrotate Change The FreeRADIUS service modifies Logrotate's global configuration with a user change option, which can lead to bad logging... Asterisk: denial of service via T.38 Zero Port An attacker can trigger a fatal error via T.38 Zero Port of Asterisk, in order to trigger a denial of service... Snort: denial of service via Ethernet Frame Decoder An attacker can trigger a fatal error via Ethernet Frame Decoder of Snort, in order to trigger a denial of service... Xen, Linux: denial of service via Map Foreign Pages An attacker, inside a guest system, can trigger a fatal error via Map Foreign Pages of Xen with Linux, in order to trigger a denial of service on the host system... Xen, Linux: denial of service via Netback Grant Mapping Errors An attacker, inside a guest system, can trigger a fatal error via Netback Grant Mapping Errors of Xen with Linux, in order to trigger a denial of service on the host system... Zabbix: Cross Site Request Forgery via CControllerAuthenticationUpdate An attacker can trigger a Cross Site Request Forgery via CControllerAuthenticationUpdate of Zabbix, in order to force the victim to perform operations... Intel Graphics Drivers: multiple vulnerabilities An attacker can use several vulnerabilities of Intel Graphics Drivers... mbsync: directory traversal via Mailbox Name An attacker can traverse directories via Mailbox Name of mbsync, in order to read a file outside the service root path... Drupal Webform: spoofing via Email Sending An attacker can create spoofed data via Email Sending of Drupal Webform, in order to deceive the victim... Pulse Connect Secure Appliance: denial of service via BIOS Trickboot Erasing An attacker can trigger a fatal error via BIOS Trickboot Erasing of Pulse Connect Secure Appliance, in order to trigger a denial of service... Trend Micro Scan Engine: denial of service via Memory Exhaustion An attacker can trigger a fatal error via Memory Exhaustion of Trend Micro Scan Engine, in order to trigger a denial of service... Cisco ASR 5000: denial of service via ipsecmgr An attacker can trigger a fatal error via ipsecmgr of Cisco ASR 5000, in order to trigger a denial of service... Cisco SD-WAN vEdge Router: privilege escalation via Signature Verification Bypass An attacker can bypass restrictions via Signature Verification Bypass of Cisco SD-WAN vEdge Router, in order to escalate his privileges... Cisco IP Phone: multiple vulnerabilities via CDP/LLDP An attacker can use several vulnerabilities of Cisco IP Phone... Cisco ESA/CSMA: information disclosure via Web-based Management Interface An attacker can bypass access restrictions to data via Web-based Management Interface of Cisco ESA/CSMA, in order to obtain sensitive information... Node.js Modules: five vulnerabilities An attacker can use several vulnerabilities of Node.js Modules... Google Chrome: multiple vulnerabilities An attacker can use several vulnerabilities of Google Chrome... Microsoft Exchange Server: multiple vulnerabilities An attacker can use several vulnerabilities of Microsoft Exchange Server... SUSE LE: vulnerability via dnssec-keygen A vulnerability via dnssec-keygen of SUSE LE was announced... OpenSSH: use after free via ssh-agent An attacker can force the usage of a freed memory area via ssh-agent of OpenSSH, in order to trigger a denial of service, and possibly to run code... GRUB2: multiple vulnerabilities An attacker can use several vulnerabilities of GRUB2... Joomla Core: multiple vulnerabilities An attacker can use several vulnerabilities of Joomla Core... wpa_supplicant: use after free via Provision Discovery Request An attacker can force the usage of a freed memory area via Provision Discovery Request of wpa_supplicant, in order to trigger a denial of service, and possibly to run code... Node.js Modules: six vulnerabilities An attacker can use several vulnerabilities of Node.js Modules... Google Android/Pixel: multiple vulnerabilities of March 2021 An attacker can use several vulnerabilities of Google Android/Pixel... Dell EMC OpenManage Server Administrator: two vulnerabilities An attacker can use several vulnerabilities of Dell EMC OpenManage Server Administrator... HCL Domino: information disclosure via Domino Access Services An attacker can bypass access restrictions to data via Domino Access Services of HCL Domino, in order to obtain sensitive information... HCL Domino: buffer overflow via Crafted Inputs An attacker can trigger a buffer overflow via Crafted Inputs of HCL Domino, in order to trigger a denial of service, and possibly to run code... Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116