The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco UCS Manager Software: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco UCS Manager Software, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via BGP MD5 Authentication Bypass
An attacker can bypass restrictions via BGP MD5 Authentication Bypass of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: spoofing via ARP Anycast Gateway
An attacker can create spoofed data via ARP Anycast Gateway of Cisco NX-OS, in order to deceive the victim...
Cisco Nexus 7000 Series Switches: denial of service via NX-API
An attacker can trigger a fatal error via NX-API of Cisco Nexus 7000 Series Switches, in order to trigger a denial of service...
Cisco Nexus 1000V Switch for VMware vSphere: denial of service via VSM Secure Login Enhancements
An attacker can trigger a fatal error via VSM Secure Login Enhancements of Cisco Nexus 1000V Switch for VMware vSphere, in order to trigger a denial of service...
Cisco UCS Manager Software: privilege escalation via Command Arguments
An attacker can bypass restrictions via Command Arguments of Cisco UCS Manager Software, in order to escalate his privileges...
Cisco UCS Manager Software: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Cisco UCS Manager Software, in order to escalate his privileges...
Cisco NX-OS: code execution via Cisco Discovery Protocol
An attacker can use a vulnerability via Cisco Discovery Protocol of Cisco NX-OS, in order to run code...
Kaspersky Anti-Virus: privilege escalation via Interprocess Communications
An attacker can bypass restrictions via Interprocess Communications of Kaspersky Anti-Virus, in order to escalate his privileges...
Dell EMC Avamar Server: open redirect
An attacker can deceive the user of Dell EMC Avamar Server, in order to redirect him to a malicious site...
Linux kernel: memory corruption via AArch64 Brk Top Byte
An attacker can trigger a memory corruption via AArch64 Brk Top Byte of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
NetworkManager VPN plugin for SSH: privilege escalation
An attacker can bypass restrictions of NetworkManager VPN plugin for SSH, in order to escalate his privileges...
Linux kernel: privilege escalation via KVM Nested VMX
An attacker, inside a guest system, can bypass restrictions via KVM Nested VMX of the Linux kernel, in order to escalate his privileges on the host system...
Python: overload via Lib/zipfile.py
An attacker can trigger an overload via Lib/zipfile.py of Python, in order to trigger a denial of service...
Chrome: three vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Sophos Endpoint Protection: vulnerability via ZIP Archive Bypass
A vulnerability via ZIP Archive Bypass of Sophos Endpoint Protection was announced...
Centreon Web: privilege escalation via Blank contact_autologin_key
An attacker can bypass restrictions via Blank contact_autologin_key of Centreon Web, in order to escalate his privileges...
Centreon Web: information disclosure via URL Session ID
An attacker can bypass access restrictions to data via URL Session ID of Centreon Web, in order to obtain sensitive information...
OpenSMTPD: code execution via Multi-line Response
An attacker can use a vulnerability via Multi-line Response of OpenSMTPD, in order to run code...
IBM QRadar Advisor With Watson App for IBM QRadar SIEM: information disclosure via HTTP Requests
An attacker can bypass access restrictions to data via HTTP Requests of IBM QRadar Advisor With Watson App for IBM QRadar SIEM, in order to obtain sensitive information...
IBM QRadar Advisor With Watson App for IBM QRadar SIEM: information disclosure via Weak Cryptographic Algorithms
An attacker can bypass access restrictions to data via Weak Cryptographic Algorithms of IBM QRadar Advisor With Watson App for IBM QRadar SIEM, in order to obtain sensitive information...
Intel Processors: information disclosure via Cleanup Errors
An attacker can bypass access restrictions to data via Cleanup Errors of Intel Processors, in order to obtain sensitive information...
Apache Tomcat: code execution via Enabled AJP Connector
An attacker can use a vulnerability via Enabled AJP Connector of Apache Tomcat, in order to run code...
Apache Tomcat: information disclosure via Reverse Proxy Transfer-Encoding End-of-line HTTP Request Smuggling
An attacker can bypass access restrictions to data via Reverse Proxy Transfer-Encoding End-of-line HTTP Request Smuggling of Apache Tomcat, in order to obtain sensitive information...
Apache Tomcat: information disclosure via Reverse Proxy Transfer-Encoding Header HTTP Request Smuggling
An attacker can bypass access restrictions to data via Reverse Proxy Transfer-Encoding Header HTTP Request Smuggling of Apache Tomcat, in order to obtain sensitive information...
Go: denial of service via Malformed Certificate
An attacker can trigger a fatal error via Malformed Certificate of Go, in order to trigger a denial of service...
SQLite: denial of service via isAuxiliaryVtabOperator
An attacker can trigger a fatal error via isAuxiliaryVtabOperator() of SQLite, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1003 1004 1005 1006 1007 1008 1009 1010 1011 1013 1015 1016 1017 1018 1019 1020 1021 1022 1023 1041 1061 1080