The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
matio: integer overflow
An attacker can trigger an integer overflow of matio, in order to trigger a denial of service, and possibly to run code...
Slurm: two vulnerabilities
An attacker can use several vulnerabilities of Slurm...
makepasswd: privilege escalation via Weak Passwords
An attacker can bypass restrictions via Weak Passwords of makepasswd, in order to escalate his privileges...
nginx: information disclosure via error_page Request Smuggling
An attacker can bypass access restrictions to data via error_page Request Smuggling of nginx, in order to obtain sensitive information...
HP InkJet: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HP InkJet, in order to run JavaScript code in the context of the web site...
IBM Spectrum Scale: privilege escalation via Setuid Files Parameters
An attacker can bypass restrictions via Setuid Files Parameters of IBM Spectrum Scale, in order to escalate his privileges...
IBM Spectrum Scale: denial of service via GPFS
An attacker can trigger a fatal error via GPFS of IBM Spectrum Scale, in order to trigger a denial of service...
IBM QRadar SIEM: privilege escalation via Weak Credential Storage
An attacker can bypass restrictions via Weak Credential Storage of IBM QRadar SIEM, in order to escalate his privileges...
IBM QRadar SIEM: information disclosure
An attacker can bypass access restrictions to data of IBM QRadar SIEM, in order to obtain sensitive information...
OTRS Help Desk: information disclosure via Drafted Messages Spoofing
An attacker can bypass access restrictions to data via Drafted Messages Spoofing of OTRS Help Desk, in order to obtain sensitive information...
OTRS Help Desk: code execution via Uploaded Inline Images SVG Javascript
An attacker can use a vulnerability via Uploaded Inline Images SVG Javascript of OTRS Help Desk, in order to run code...
OTRS Help Desk: information disclosure via From Field Spoofing
An attacker can bypass access restrictions to data via From Field Spoofing of OTRS Help Desk, in order to obtain sensitive information...
ldm: code execution via Hook Script
An attacker can use a vulnerability via Hook Script of ldm, in order to run code...
sa-exim: code execution via Greylisting.pm Eval
An attacker can use a vulnerability via Greylisting.pm Eval of sa-exim, in order to run code...
SHA1: information disclosure via Chosen-Prefix Collision
An attacker can trigger a Chosen-Prefix Collision on SHA1, in order to alter a signature, to obtain sensitive information...
Ignite Openfire: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Ignite Openfire, in order to run JavaScript code in the context of the web site...
CA Automic Dollar Universe 5: privilege escalation via uxdqmsrv
An attacker can bypass restrictions via uxdqmsrv of CA Automic Dollar Universe 5, in order to escalate his privileges...
Cisco UCS Director: information disclosure via System Log Files
An attacker can bypass access restrictions to data via System Log Files of Cisco UCS Director, in order to obtain sensitive information...
Cisco IP Phone: Cross Site Scripting via Multiplatform Firmware
An attacker can trigger a Cross Site Scripting via Multiplatform Firmware of Cisco IP Phone, in order to run JavaScript code in the context of the web site...
Cisco IOS, IOS XE: Cross Site Request Forgery via Web UI
An attacker can trigger a Cross Site Request Forgery via Web UI of Cisco IOS or IOS XE, in order to force the victim to perform operations...
Juniper Networks Junos Space: directory traversal via HTTP
An attacker can traverse directories via HTTP of Juniper Networks Junos Space, in order to read a file outside the service root path...
Junos OS MX: denial of service via BBE MPLS/IPv6
An attacker can send malicious BBE MPLS/IPv6 packets to Junos OS MX, in order to trigger a denial of service...
Junos OS: Cross Site Scripting via J-Web
An attacker can trigger a Cross Site Scripting via J-Web of Junos OS, in order to run JavaScript code in the context of the web site...
Junos OS: directory traversal via J-Web
An attacker can traverse directories via J-Web of Junos OS, in order to read/write a file outside the service root path...
Junos OS EX/QFX: privilege escalation via Stateless IP Firewall Filter
An attacker can bypass restrictions via Stateless IP Firewall Filter of Junos OS EX/QFX, in order to escalate his privileges...
Junos OS: denial of service via IPv6
An attacker can send malicious IPv6 packets to Junos OS, in order to trigger a denial of service...
Junos OS: three vulnerabilities via JDHCPD
An attacker can use several vulnerabilities via JDHCPD of Junos OS...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 991 992 993 994 995 996 997 998 999 1001 1003 1004 1005 1006 1007 1008 1009 1010 1011 1013