The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Prime Infrastructure: SQL injection
An attacker can use a SQL injection of Cisco Prime Infrastructure, in order to read or alter data...
Cisco IOS XE: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco IOS XE...
Cisco Nexus: code execution via onePK
An attacker can use a vulnerability via onePK of Cisco Nexus, in order to run code...
Cisco IOS: privilege escalation via Cisco Industrial Routers Image Verification Bypass
An attacker can bypass restrictions via Cisco Industrial Routers Image Verification Bypass of Cisco IOS, in order to escalate his privileges...
Cisco IOS: privilege escalation via Cisco Industrial Routers Virtual Device Server
An attacker can bypass restrictions via Cisco Industrial Routers Virtual Device Server of Cisco IOS, in order to escalate his privileges...
Cisco IOS: code execution via Cisco Industrial Routers Virtual Device Server
An attacker can use a vulnerability via Cisco Industrial Routers Virtual Device Server of Cisco IOS, in order to run code...
Cisco IOS: code execution via Cisco Industrial Routers Virtual Device Server
An attacker can use a vulnerability via Cisco Industrial Routers Virtual Device Server of Cisco IOS, in order to run code...
Cisco IOS: code execution via Cisco Industrial Routers
An attacker can use a vulnerability via Cisco Industrial Routers of Cisco IOS, in order to run code...
Cisco IOS / IOS XE: denial of service via IKEv2
An attacker can trigger a fatal error via IKEv2 of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS XE: denial of service via Catalyst 9800 Series Wireless Controllers
An attacker can trigger a fatal error via Catalyst 9800 Series Wireless Controllers of Cisco IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via CIP
An attacker can trigger a fatal error via CIP of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS: privilege escalation via Catalyst 2960-L / CDB-8P
An attacker can bypass restrictions via Catalyst 2960-L / CDB-8P of Cisco IOS, in order to escalate his privileges...
Cisco IOS XE: privilege escalation via SD-WAN Software
An attacker can bypass restrictions via SD-WAN Software Authentication Bypass of Cisco IOS XE, in order to escalate his privileges...
Cisco ASR 920: denial of service via SNMP
An attacker can trigger a fatal error via SNMP of Cisco ASR 920, in order to trigger a denial of service...
Drupal Services: privilege escalation via Taxonomy Term
An attacker can bypass restrictions via Taxonomy Term of Drupal Services, in order to escalate his privileges...
OpenStack Cinder: information disclosure via Dell EMC ScaleIO/VxFlex OS Backend
An attacker can bypass access restrictions to data via Dell EMC ScaleIO/VxFlex OS Backend of OpenStack Cinder, in order to obtain sensitive information...
Grafana: information disclosure via Avatar HTTP Scan
An attacker can bypass access restrictions to data via Avatar HTTP Scan of Grafana, in order to obtain sensitive information...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Django: two vulnerabilities
An attacker can use several vulnerabilities of Django...
Symfony: privilege escalation via AbstractToken-hasUserChanged
An attacker can bypass restrictions via AbstractToken::hasUserChanged() of Symfony, in order to escalate his privileges...
Grafana: Cross Site Scripting via Dashboard Settings
An attacker can trigger a Cross Site Scripting via Dashboard Settings of Grafana, in order to run JavaScript code in the context of the web site...
Grafana: Cross Site Scripting via Table Panel Set Column Styles
An attacker can trigger a Cross Site Scripting via Table Panel Set Column Styles of Grafana, in order to run JavaScript code in the context of the web site...
Grafana: Cross Site Scripting via Text Panel Set Options
An attacker can trigger a Cross Site Scripting via Text Panel Set Options of Grafana, in order to run JavaScript code in the context of the web site...
Joomla Core: wrong default permissions
An attacker can make profit of wrng default permissions in Joomla Core...
Joomla Core: Cross Site Scripting via com_module
An attacker can trigger a Cross Site Scripting via com_module of Joomla Core, in order to run JavaScript code in the context of the web site...
Joomla Core: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Core, in order to run JavaScript code in the context of the web site...
Joomla Core: Cross Site Request Forgery via com_postinstall
An attacker can trigger a Cross Site Request Forgery via com_postinstall of Joomla Core, in order to force the victim to perform operations...
Node Core: three vulnerabilities
An attacker can use several vulnerabilities of Node Core...
Docker Engine: Man-in-the-Middle via IPv6 Router Advertisement
An attacker can act as a Man-in-the-Middle via an IPv6 Router Advertisement against Docker Engine, in order to read or write data in the session...
Linux kernel: memory leak via go7007_snd_init
An attacker can create a memory leak via go7007_snd_init() of the Linux kernel, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1028 1029 1030 1031 1032 1033 1034 1035 1036 1038 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049