The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Unified Communications Manager: Cross Site Request Forgery via Web-based Management Interface
An attacker can trigger a Cross Site Request Forgery via Web-based Management Interface of Cisco Unified Communications Manager, in order to force the victim to perform operations...
Cisco IOS XE SD-WAN: privilege escalation via Default Credentials
An attacker can bypass restrictions via Default Credentials of Cisco IOS XE SD-WAN, in order to escalate his privileges...
Cisco ESA: denial of service via Zip Decompression
An attacker can trigger a fatal error via Zip Decompression of Cisco ESA, in order to trigger a denial of service...
Cisco ESA: privilege escalation via Content Filter Bypass
An attacker can bypass restrictions via Content Filter Bypass of Cisco ESA, in order to escalate his privileges...
Cisco ESA: Cross Site Scripting via Web-based Management Interface
An attacker can trigger a Cross Site Scripting via Web-based Management Interface of Cisco ESA, in order to run JavaScript code in the context of the web site...
Cisco WSA, SMA: read-write access via HTTP Header Injection
An attacker can bypass access restrictions via HTTP Header Injection of Cisco WSA or SMA, in order to read or alter data...
Cisco SD-WAN vManage: SQL injection via Web Interface
An attacker can use a SQL injection via Web Interface of Cisco SD-WAN vManage, in order to read or alter data...
Cisco SD-WAN vManage: SQL injection via Web Interface
An attacker can use a SQL injection via Web Interface of Cisco SD-WAN vManage, in order to read or alter data...
Cisco SD-WAN vManage: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco SD-WAN vManage, in order to escalate his privileges...
Cisco SD-WAN vManage: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Cisco SD-WAN vManage, in order to run code...
Cisco IOS XR: denial of service via BGP EVPN Operational Routes
An attacker can trigger a fatal error via BGP EVPN Operational Routes of Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: multiple vulnerabilities via BGP EVPN
An attacker can use several vulnerabilities via BGP EVPN of Cisco IOS XR...
Cisco IOS XR: denial of service via IS-IS SNMP
An attacker can trigger a fatal error via IS-IS SNMP of Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: denial of service via BGP Update Attribute
An attacker can trigger a fatal error via BGP Update Attribute of Cisco IOS XR, in order to trigger a denial of service...
Cisco Unified Communications Manager: information disclosure via Web-based Management Interface
An attacker can bypass access restrictions to data via Web-based Management Interface of Cisco Unified Communications Manager, in order to obtain sensitive information...
Mitel 6970: code execution via Port Configuration Power On
An attacker can use a vulnerability via Port Configuration Power On of Mitel 6970, in order to run code...
Forcepoint Web Security: Cross Site Scripting via Host Header
An attacker can trigger a Cross Site Scripting via Host Header of Forcepoint Web Security, in order to run JavaScript code in the context of the web site...
libxml2: infinite loop via xmlStringLenDecodeEntities
An attacker can trigger an infinite loop via xmlStringLenDecodeEntities() of libxml2, in order to trigger a denial of service...
libxml2: memory leak via xmlSchemaValidateStream
An attacker can create a memory leak via xmlSchemaValidateStream() of libxml2, in order to trigger a denial of service...
ReportLab: code execution via toColor eval
An attacker can use a vulnerability via toColor eval of ReportLab, in order to run code...
NetBSD: read-write access via SIOCGATHDIAG SIOCSIFDESCR SIOCGUMBINFO
An attacker can bypass access restrictions via SIOCGATHDIAG SIOCSIFDESCR SIOCGUMBINFO of NetBSD, in order to read or alter data...
Antivirus: denial of service via Ransomware Shield API EncryptFile
An attacker can trigger a fatal error via Ransomware Shield API EncryptFile of several Windows antivirus, in order to trigger a denial of service...
Enigmail: spoofing via Unsigned Parts Displayed Signed
An attacker can create spoofed data via Unsigned Parts Displayed Signed of Enigmail, in order to deceive the victim...
Xfig fig2dev: buffer overflow via read_textobject
An attacker can trigger a buffer overflow via read_textobject() of Xfig fig2dev, in order to trigger a denial of service, and possibly to run code...
Xfig fig2dev: buffer overflow via calc_arrow
An attacker can trigger a buffer overflow via calc_arrow() of Xfig fig2dev, in order to trigger a denial of service, and possibly to run code...
PySAML2: spoofing via XML Signature Wrapping
An attacker can create spoofed data via XML Signature Wrapping of PySAML2, in order to deceive the victim...
serialize-javascript: Cross Site Scripting via Regular Expressions
An attacker can trigger a Cross Site Scripting via Regular Expressions of serialize-javascript, in order to run JavaScript code in the context of the web site...
Samba: three vulnerabilities
An attacker can use several vulnerabilities of Samba...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 994 995 996 997 998 999 1000 1001 1002 1004 1006 1007 1008 1009 1010 1011 1012