The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP APM: denial of service via Modern Customization Access Profile Session Variables
An attacker can trigger a fatal error via Modern Customization Access Profile Session Variables of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via iRulesLX Binaries
An attacker can bypass restrictions via iRulesLX Binaries of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: Man-in-the-Middle via Server SSL Revoked Certificates
An attacker can act as a Man-in-the-Middle via Server SSL Revoked Certificates on F5 BIG-IP, in order to read or write data in the session...
F5 BIG-IP: Cross Site Scripting via TMUI
An attacker can trigger a Cross Site Scripting via TMUI of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
F5 BIG-IP ASM: Cross Site Scripting via Configuration Utility
An attacker can trigger a Cross Site Scripting via Configuration Utility of F5 BIG-IP ASM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: denial of service via UDP
An attacker can send malicious UDP packets to F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: Man-in-the-Middle via SSH Server Key Size
An attacker can act as a Man-in-the-Middle via SSH Server Key Size on F5 BIG-IP, in order to read or write data in the session...
F5 BIG-IP: use after free via SIP ALG Profile
An attacker can force the usage of a freed memory area via SIP ALG Profile of F5 BIG-IP, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of F5 BIG-IP, in order to force the victim to perform operations...
F5 BIG-IP ASM: denial of service via Server Cookie
An attacker can trigger a fatal error via Server Cookie of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP: directory traversal via Certificate Administrator User Role
An attacker can traverse directories via Certificate Administrator User Role of F5 BIG-IP, in order to read a file outside the service root path...
F5 BIG-IP: denial of service via TMM SCTP
An attacker can trigger a fatal error via TMM SCTP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP AFM: SQL injection via Configuration Utility
An attacker can use a SQL injection via Configuration Utility of F5 BIG-IP AFM, in order to read or alter data...
F5 BIG-IP: Cross Site Request Forgery via iControl REST
An attacker can trigger a Cross Site Request Forgery via iControl REST of F5 BIG-IP, in order to force the victim to perform operations...
F5 BIG-IP: denial of service via Restjavad Process Dump
An attacker can trigger a fatal error via Restjavad Process Dump of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: memory leak via RADIUS Authentication
An attacker can create a memory leak via RADIUS Authentication of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via Self-IP Port-lockdown Bypass
An attacker can bypass restrictions via Self-IP Port-lockdown Bypass of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP ASM: information disclosure via Request Event Log
An attacker can bypass access restrictions to data via Request Event Log of F5 BIG-IP ASM, in order to obtain sensitive information...
F5 BIG-IP: memory leak via VIPRION MCPD SYN Flood
An attacker can create a memory leak via VIPRION MCPD SYN Flood of F5 BIG-IP, in order to trigger a denial of service...
X.Org Xserver Extensions: four vulnerabilities
An attacker can use several vulnerabilities of X.Org Xserver Extensions...
libX11: use after free via Locale
An attacker can force the usage of a freed memory area via Locale of libX11, in order to trigger a denial of service, and possibly to run code...
Mozilla Firefox/Thunderbird: multiple vulnerabilities
An attacker can use several vulnerabilities of Mozilla Firefox/Thunderbird...
Linux kernel: denial of service via FUSE Filesystem PID Namespace Mounting
An attacker can trigger a fatal error via FUSE Filesystem PID Namespace Mounting of the Linux kernel, in order to trigger a denial of service...
QEMU: memory corruption via USB Emulator
An attacker, inside a guest system, can trigger a memory corruption via USB Emulator of QEMU, in order to trigger a denial of service, and possibly to run code on the host system...
VMware ESXi, VMware vCenter Server: denial of service via Authentication Services
An attacker can trigger a fatal error via Authentication Services of VMware ESXi and VMware vCenter Server, in order to trigger a denial of service...
Squid cache: information disclosure via HTTP Request Smuggling
An attacker can bypass access restrictions to data via HTTP Request Smuggling of Squid cache, in order to obtain sensitive information...
Squid cache: overload via Cache Digest Response
An attacker can trigger an overload via Cache Digest Response of Squid cache, in order to trigger a denial of service...
Squid cache: information disclosure via HTTP Request Splitting
An attacker can bypass access restrictions to data via HTTP Request Splitting of Squid cache, in order to obtain sensitive information...
Chrony: privilege escalation via PID File
An attacker can bypass restrictions via PID File of Chrony, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1053 1054 1055 1056 1057 1058 1059 1060 1061 1063 1065 1066 1067 1068 1069 1070