The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Email Security Appliance: privilege escalation via URL Filtering Bypass
An attacker can bypass restrictions via URL Filtering Bypass of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco Data Center Network Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Data Center Network Manager, in order to run JavaScript code in the context of the web site...
Cisco ASR 5000: privilege escalation via Enhanced Charging Service
An attacker can bypass restrictions via Enhanced Charging Service of Cisco ASR 5000, in order to escalate his privileges...
Treck IP Stack: multiple vulnerabilities
An attacker can use several vulnerabilities of Treck IP Stack...
Arm Cortex Processors: information disclosure via Straight Line Speculation
An attacker can bypass access restrictions to data via Straight Line Speculation of Arm Cortex Processors, in order to obtain sensitive information...
Pulse Secure Client: privilege escalation via dsInstallerService
An attacker can bypass restrictions via dsInstallerService of Pulse Secure Client, in order to escalate his privileges...
Chrome: three vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Intel BIOS: privilege escalation
An attacker can bypass restrictions of Intel BIOS, in order to escalate his privileges...
Intel CSME/SPS/TXE/AMT/ISM/DAL: multiple vulnerabilities
An attacker can use several vulnerabilities of Intel CSME/SPS/TXE/AMT/ISM/DAL...
FreeIPA: privilege escalation via Local Account Name
An attacker can bypass restrictions via Local Account Name of FreeIPA, in order to escalate his privileges...
libjcat: code execution via PGP Signature Verification Bypass
An attacker can use a vulnerability via PGP Signature Verification Bypass of libjcat, in order to run code...
libvirt: denial of service via Monitor Job Guest Agent Query
An attacker can trigger a fatal error via Monitor Job Guest Agent Query of libvirt, in order to trigger a denial of service...
IBM MQ: privilege escalation via AMQP Channels SSLPEER Bypass
An attacker can bypass restrictions via AMQP Channels SSLPEER Bypass of IBM MQ, in order to escalate his privileges...
fwupd: code execution via PGP Signature Verification Bypass
An attacker can use a vulnerability via PGP Signature Verification Bypass of fwupd, in order to run code...
Node.js minimist: denial of service via Prototype Pollution
An attacker can trigger a fatal error via Prototype Pollution of Node.js minimist, in order to trigger a denial of service...
rubygem-bundler: code execution via Temporary Directory
An attacker can use a vulnerability via Temporary Directory of rubygem-bundler, in order to run code...
IBM Spectrum Protect: privilege escalation
An attacker can bypass restrictions of IBM Spectrum Protect, in order to escalate his privileges...
IBM MQ: memory leak
An attacker can create a memory leak of IBM MQ, in order to trigger a denial of service...
IBM MQ: denial of service via Data Conversion Logic
An attacker can trigger a fatal error via Data Conversion Logic of IBM MQ, in order to trigger a denial of service...
libexif: integer overflow via exif_data_load_data_content
An attacker can trigger an integer overflow via exif_data_load_data_content() of libexif, in order to trigger a denial of service, and possibly to run code...
libexif: out-of-bounds memory reading via exif_entry_get_value
An attacker can force a read at an invalid address via exif_entry_get_value() of libexif, in order to trigger a denial of service, or to obtain sensitive information...
FortiAnalyzer/FortiManager: information disclosure via Hard-coded Cryptographic Key
An attacker can bypass access restrictions to data via Hard-coded Cryptographic Key of FortiAnalyzer/FortiManager, in order to obtain sensitive information...
IBM Workload Scheduler: Cross Site Scripting via Dynamic Workload Console
An attacker can trigger a Cross Site Scripting via Dynamic Workload Console of IBM Workload Scheduler, in order to run JavaScript code in the context of the web site...
Vim: code execution via Scripting Interfaces Restricted Mode Bypass
An attacker can use a vulnerability via Scripting Interfaces Restricted Mode Bypass of Vim, in order to run code...
IBM API Connect: Cross Site Scripting via Web UI
An attacker can trigger a Cross Site Scripting via Web UI of IBM API Connect, in order to run JavaScript code in the context of the web site...
WordPress Core: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1032 1033 1034 1035 1036 1037 1038 1039 1040 1042 1044 1045 1046 1047 1048 1049