The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IBM Spectrum Scale: privilege escalation via Setuid Files Parameters
An attacker can bypass restrictions via Setuid Files Parameters of IBM Spectrum Scale, in order to escalate his privileges...
IBM Spectrum Scale: denial of service via GPFS
An attacker can trigger a fatal error via GPFS of IBM Spectrum Scale, in order to trigger a denial of service...
IBM QRadar SIEM: privilege escalation via Weak Credential Storage
An attacker can bypass restrictions via Weak Credential Storage of IBM QRadar SIEM, in order to escalate his privileges...
IBM QRadar SIEM: information disclosure
An attacker can bypass access restrictions to data of IBM QRadar SIEM, in order to obtain sensitive information...
OTRS Help Desk: information disclosure via Drafted Messages Spoofing
An attacker can bypass access restrictions to data via Drafted Messages Spoofing of OTRS Help Desk, in order to obtain sensitive information...
OTRS Help Desk: code execution via Uploaded Inline Images SVG Javascript
An attacker can use a vulnerability via Uploaded Inline Images SVG Javascript of OTRS Help Desk, in order to run code...
OTRS Help Desk: information disclosure via From Field Spoofing
An attacker can bypass access restrictions to data via From Field Spoofing of OTRS Help Desk, in order to obtain sensitive information...
ldm: code execution via Hook Script
An attacker can use a vulnerability via Hook Script of ldm, in order to run code...
sa-exim: code execution via Greylisting.pm Eval
An attacker can use a vulnerability via Greylisting.pm Eval of sa-exim, in order to run code...
SHA1: information disclosure via Chosen-Prefix Collision
An attacker can trigger a Chosen-Prefix Collision on SHA1, in order to alter a signature, to obtain sensitive information...
Ignite Openfire: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Ignite Openfire, in order to run JavaScript code in the context of the web site...
CA Automic Dollar Universe 5: privilege escalation via uxdqmsrv
An attacker can bypass restrictions via uxdqmsrv of CA Automic Dollar Universe 5, in order to escalate his privileges...
Cisco UCS Director: information disclosure via System Log Files
An attacker can bypass access restrictions to data via System Log Files of Cisco UCS Director, in order to obtain sensitive information...
Cisco IP Phone: Cross Site Scripting via Multiplatform Firmware
An attacker can trigger a Cross Site Scripting via Multiplatform Firmware of Cisco IP Phone, in order to run JavaScript code in the context of the web site...
Cisco IOS, IOS XE: Cross Site Request Forgery via Web UI
An attacker can trigger a Cross Site Request Forgery via Web UI of Cisco IOS or IOS XE, in order to force the victim to perform operations...
Juniper Networks Junos Space: directory traversal via HTTP
An attacker can traverse directories via HTTP of Juniper Networks Junos Space, in order to read a file outside the service root path...
Junos OS MX: denial of service via BBE MPLS/IPv6
An attacker can send malicious BBE MPLS/IPv6 packets to Junos OS MX, in order to trigger a denial of service...
Junos OS: Cross Site Scripting via J-Web
An attacker can trigger a Cross Site Scripting via J-Web of Junos OS, in order to run JavaScript code in the context of the web site...
Junos OS: directory traversal via J-Web
An attacker can traverse directories via J-Web of Junos OS, in order to read/write a file outside the service root path...
Junos OS EX/QFX: privilege escalation via Stateless IP Firewall Filter
An attacker can bypass restrictions via Stateless IP Firewall Filter of Junos OS EX/QFX, in order to escalate his privileges...
Junos OS: denial of service via IPv6
An attacker can send malicious IPv6 packets to Junos OS, in order to trigger a denial of service...
Junos OS: three vulnerabilities via JDHCPD
An attacker can use several vulnerabilities via JDHCPD of Junos OS...
Junos OS: denial of service via PCEP
An attacker can send malicious PCEP packets to Junos OS, in order to trigger a denial of service...
Junos OS: infinite loop via RPD SNMP Command
An attacker can trigger an infinite loop via RPD SNMP Command of Junos OS, in order to trigger a denial of service...
Firefox/Thunderbird: memory corruption via IonMonkey JIT Compiler
An attacker can trigger a memory corruption via IonMonkey JIT Compiler of Mozilla Firefox, in order to trigger a denial of service, and possibly to run code...
Chrome: use after free via Audio
An attacker can force the usage of a freed memory area via Audio of Chrome, in order to trigger a denial of service, and possibly to run code...
Dovecot: NULL pointer dereference via Push Notification
An attacker can force a NULL pointer to be dereferenced via Push Notification of Dovecot, in order to trigger a denial of service...
phpMyAdmin: SQL injection via User Accounts Page
An attacker can use a SQL injection via User Accounts Page of phpMyAdmin, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 990 991 992 993 994 995 996 997 998 1000 1002 1003 1004 1005 1006 1007 1008 1009 1010 1021 1041 1061 1080