The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ESA/SMA: information disclosure via CLI
An attacker can bypass access restrictions to data via CLI of Cisco ESA/SMA, in order to obtain sensitive information...
Cisco Unified Communications Manager: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications Manager, in order to run JavaScript code in the context of the web site...
Cisco Unified Communications: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Unified Communications, in order to run JavaScript code in the context of the web site...
Cisco IOS XR: denial of service via BGP
An attacker can trigger a fatal error via BGP of Cisco IOS XR, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via IPv6
An attacker can send malicious IPv6 packets to Cisco ASR 5000, in order to trigger a denial of service...
Cisco ASR 5000: denial of service via IPv6
An attacker can send malicious IPv6 packets to Cisco ASR 5000, in order to trigger a denial of service...
Cisco AnyConnect Secure Mobility Client for Windows: privilege escalation via Profile Modification
An attacker can bypass restrictions via Profile Modification of Cisco AnyConnect Secure Mobility Client for Windows, in order to escalate his privileges...
Cisco AnyConnect Secure Mobility Client for Windows: denial of service via IPC
An attacker can trigger a fatal error via IPC of Cisco AnyConnect Secure Mobility Client for Windows, in order to trigger a denial of service...
Cisco AnyConnect Secure Mobility Client for Windows: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Cisco AnyConnect Secure Mobility Client for Windows, in order to execute code...
Ansible Tower: information disclosure via Named URLs
An attacker can bypass access restrictions to data via Named URLs of Ansible Tower, in order to obtain sensitive information...
Ansible Tower: information disclosure via Labels
An attacker can bypass access restrictions to data via Labels of Ansible Tower, in order to obtain sensitive information...
Ansible Tower: Cross Site Request Forgery via Webhooks
An attacker can trigger a Cross Site Request Forgery via Webhooks of Ansible Tower, in order to force the victim to perform operations...
Ansible Tower: Cross Site Request Forgery via Credentials
An attacker can trigger a Cross Site Request Forgery via Credentials of Ansible Tower, in order to force the victim to perform operations...
IBM MQ: denial of service via Queue Processing
An attacker can trigger a fatal error via Queue Processing of IBM MQ, in order to trigger a denial of service...
IBM MQ: denial of service via Pubsub Logic
An attacker can trigger a fatal error via Pubsub Logic of IBM MQ, in order to trigger a denial of service...
Trend Micro OfficeScan/ServerProtect: privilege escalation via Rootkit Protection Driver
An attacker can bypass restrictions via Rootkit Protection Driver of Trend Micro OfficeScan/ServerProtect, in order to escalate his privileges...
Whoopsie: memory leak via parse_report
An attacker can create a memory leak via parse_report() of Whoopsie, in order to trigger a denial of service...
Whoopsie: memory corruption via File Parsing
An attacker can trigger a memory corruption via File Parsing of Whoopsie, in order to trigger a denial of service, and possibly to run code...
Whoopsie: memory leak
An attacker can create a memory leak of Whoopsie, in order to trigger a denial of service...
libvirt: privilege escalation via UNIX Domain Socket
An attacker can bypass restrictions via UNIX Domain Socket of libvirt, in order to escalate his privileges...
Apport: privilege escalation via Check Bypass
An attacker can bypass restrictions via Check Bypass of Apport, in order to escalate his privileges...
Apport: denial of service via Configuration Files Parsing
An attacker can trigger a fatal error via Configuration Files Parsing of Apport, in order to trigger a denial of service...
Apport: file reading via Certain D-Bus Calls
A local attacker can read a file via Certain D-Bus Calls of Apport, in order to obtain sensitive information...
ppp: privilege escalation via Kernel Module Loading
An attacker can bypass restrictions via Kernel Module Loading of ppp, in order to escalate his privileges...
Net-SNMP: privilege escalation via MIB Symlink
An attacker can bypass restrictions via MIB Symlink of Net-SNMP, in order to escalate his privileges...
Google Android/Pixel: multiple vulnerabilities of August 2020
An attacker can use several vulnerabilities of Google Android/Pixel...
Open-iSCSI rtslib-fb: read-write access via /etc/target/saveconfig.json
An attacker can bypass access restrictions via /etc/target/saveconfig.json of Open-iSCSI rtslib-fb, in order to read or alter data...
WebKitGTK: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
Cacti: Cross Site Scripting via Template Import Preview
An attacker can trigger a Cross Site Scripting via Template Import Preview of Cacti, in order to run JavaScript code in the context of the web site...
Bluetooth: privilege escalation via BR/EDR Impersonation Attack
An attacker can bypass restrictions via BR/EDR Impersonation Attack of Bluetooth, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1048 1049 1050 1051 1052 1053 1054 1055 1056 1058 1060 1061 1062 1063 1064 1065 1066 1067 1068 1078