The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco SMA/WSA: information disclosure via Web-based Management Interface
An attacker can bypass access restrictions to data via Web-based Management Interface of Cisco SMA/WSA, in order to obtain sensitive information...
Cisco ESA: overload via TLS
An attacker can trigger an overload via TLS of Cisco ESA, in order to trigger a denial of service...
Cisco ESA: information disclosure via Web-based Management Interface
An attacker can bypass access restrictions to data via Web-based Management Interface of Cisco ESA, in order to obtain sensitive information...
Node.js bcrypt: information disclosure via Inadequate Encryption Strength
An attacker can bypass access restrictions to data via Inadequate Encryption Strength of Node.js bcrypt, in order to obtain sensitive information...
Symfony: code execution via CachingHttpClient
An attacker can use a vulnerability via CachingHttpClient of Symfony, in order to run code...
TYPO3 Event management and registration: two vulnerabilities
An attacker can use several vulnerabilities of TYPO3 Event management and registration...
TYPO3 Localization Manager: information disclosure
An attacker can bypass access restrictions to data of TYPO3 Localization Manager, in order to obtain sensitive information...
HCL Domino: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HCL Domino, in order to run JavaScript code in the context of the web site...
HCL Domino: buffer overflow via LDAP Query
An attacker can trigger a buffer overflow via LDAP Query of HCL Domino, in order to trigger a denial of service, and possibly to run code...
HCL Domino/iNotes: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HCL Domino/iNotes, in order to run JavaScript code in the context of the web site...
HCL Domino/iNotes: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HCL Domino/iNotes, in order to run JavaScript code in the context of the web site...
HCL Domino/iNotes: open redirect via Link Injection
An attacker can deceive the user via Link Injection of HCL Domino/iNotes, in order to redirect him to a malicious site...
HCL Domino/iNotes: Cross Site Scripting via Form POST Request
An attacker can trigger a Cross Site Scripting via Form POST Request of HCL Domino/iNotes, in order to run JavaScript code in the context of the web site...
HCL Domino: buffer overflow via MIME Message Handling
An attacker can trigger a buffer overflow via MIME Message Handling of HCL Domino, in order to trigger a denial of service, and possibly to run code...
HCL Domino: buffer overflow
An attacker can trigger a buffer overflow of HCL Domino, in order to trigger a denial of service, and possibly to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Django: two vulnerabilities
An attacker can use several vulnerabilities of Django...
Ark: directory traversal via TAR Archive With Symlinks
An attacker can traverse directories via TAR Archive With Symlinks of Ark, in order to read a file outside the service root path...
Trend Micro ScanMail for Microsoft Exchange: directory traversal via PortalProtect ActiveUpdate
An attacker can traverse directories via PortalProtect ActiveUpdate of Trend Micro ScanMail for Microsoft Exchange, in order to read a file outside the service root path...
Ansible Core: code execution via Packages Not GPG Validated
An attacker can use a vulnerability via Packages Not GPG Validated of Ansible Core, in order to run code...
Fedora: security improvement via SELinux Policy
The security of Fedora was improved via SELinux Policy...
Shibboleth Service Provider: denial of service via Modern IIS Module
An attacker can trigger a fatal error via Modern IIS Module of Shibboleth Service Provider, in order to trigger a denial of service...
Trend Micro OfficeScan XG: privilege escalation via Hard Link
An attacker can bypass restrictions via Hard Link of Trend Micro OfficeScan XG, in order to escalate his privileges...
Grafana: file reading via MySQL Connection String
A local attacker can read a file via MySQL Connection String of Grafana, in order to obtain sensitive information...
librepo: directory traversal
An attacker can traverse directories of librepo, in order to override a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1055 1056 1057 1058 1059 1060 1061 1062 1063 1065 1067 1068 1069 1070