The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Ghostscript: buffer overflow via jbig2_image_compose
An attacker can trigger a buffer overflow via jbig2_image_compose() of Ghostscript, in order to trigger a denial of service, and possibly to run code...
GNU Mailman: Cross Site Scripting via Options Content Injection
An attacker can trigger a Cross Site Scripting via Options Content Injection of GNU Mailman, in order to run JavaScript code in the context of the web site...
Cisco ASA: denial of service via DHCP
An attacker can send malicious DHCP packets to Cisco ASA, in order to trigger a denial of service...
Cisco Unified Computing System Director: privilege escalation
An attacker can bypass restrictions of Cisco Unified Computing System Director, in order to escalate his privileges...
MongoDB Server: privilege escalation via serialization
An attacker can bypass restrictions via serialization of MongoDB Server, in order to escalate his privileges...
Cisco ASA: denial of service via BGP
An attacker can send malicious BGP packets to Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via IKEv1
An attacker can trigger a fatal error via IKEv1 of Cisco ASA, in order to trigger a denial of service...
Cisco Content Security Management Appliance: open redirect
An attacker can deceive the user of Cisco Content Security Management Appliance, in order to redirect him to a malicious site...
Suricata: multiple vulnerabilities
An attacker can use several vulnerabilities of Suricata...
libvirt: two vulnerabilities
An attacker can use several vulnerabilities of libvirt...
slirp4netns: use after free via ip_reass
An attacker can force the usage of a freed memory area via ip_reass() of slirp4netns, in order to trigger a denial of service, and possibly to run code...
Drupal Webform: seven vulnerabilities
An attacker can use several vulnerabilities of Drupal Webform...
OpenStack Keystone: privilege escalation via the EC2 API Signature TTL
An attacker can bypass restrictions via EC2 API of OpenStack Keystone, in order to escalate his privileges...
Cisco ASA: privilege escalation via Kerberos
An attacker can bypass restrictions via Kerberos of Cisco ASA, in order to escalate his privileges...
Cisco ASA: directory traversal
An attacker can traverse directories of Cisco ASA, in order to read a file outside the service root path...
Cisco ASA: denial of service via DNS over IPv6
An attacker can send malicious DNS over IPv6 packets to Cisco ASA, in order to trigger a denial of service...
Cisco ASA: memory leak via MGCP
An attacker can create a memory leak via MGCP of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via OSPF
An attacker can send malicious OSPF packets to Cisco ASA, in order to trigger a denial of service...
Cisco ASA: memory leak via TLS
An attacker can create a memory leak via TLS of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: memory leak via OSPF
An attacker can create a memory leak via OSPF of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: information disclosure via HTTP GET
An attacker can bypass access restrictions to data via HTTP GET of Cisco ASA, in order to obtain sensitive information...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Google Chrome: memory corruption via Blink
An attacker can trigger a memory corruption via Blink of Google Chrome, in order to trigger a denial of service, and possibly to run code...
Mozilla Firefox, Google Chrome: buffer overflow via SCTP
An attacker can trigger a buffer overflow via SCTP in Mozilla Firefox and Google Chrome, in order to trigger a denial of service, and possibly to run code...
pfSense: two vulnerabilities
An attacker can use several vulnerabilities of pfSense...
Linux kernel: information disclosure via fill_thread_core_info
A local attacker can read a memory fragment via fill_thread_core_info() of the Linux kernel, in order to obtain sensitive information...
IBM WebSphere Application Server Liberty: privilege escalation via openidConnectServer
An authenticated attacker can bypass restrictions via openidConnectServer of IBM WebSphere Application Server Liberty, in order to escalate his privileges...
Mozilla Firefox, Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox...
RoundCube Webmail: two vulnerabilities
An attacker can use several vulnerabilities of RoundCube Webmail...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022 1023 1024 1025 1026 1027 1028 1029 1031 1033 1034 1035 1036