The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Brocade FabricOS: privilege escalation via CLI Secccrypptocfg
An attacker can bypass restrictions via CLI Secccrypptocfg of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: buffer overflow via REST API
An attacker can trigger a buffer overflow via REST API of Brocade FabricOS, in order to trigger a denial of service, and possibly to run code...
Brocade FabricOS: privilege escalation via CLI Shell Variables
An attacker can bypass restrictions via CLI Shell Variables of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Seccryptocfg Templates
An attacker can bypass restrictions via Seccryptocfg Templates of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Firmware Download Password
An attacker can bypass restrictions via Firmware Download Password of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Supportlink CLI Password Field
An attacker can bypass restrictions via Supportlink CLI Password Field of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: privilege escalation via Host Header Injection
An attacker can bypass restrictions via Host Header Injection of Brocade FabricOS, in order to escalate his privileges...
Brocade FabricOS: denial of service via Management Interface
An attacker can trigger a fatal error via Management Interface of Brocade FabricOS, in order to trigger a denial of service...
Brocade FabricOS: Cross Site Scripting via HTTP Management Interface
An attacker can trigger a Cross Site Scripting via HTTP Management Interface of Brocade FabricOS, in order to run JavaScript code in the context of the web site...
Yaws: code execution via CGI
An attacker can use a vulnerability via CGI of Yaws, in order to run code...
Yaws: external XML entity injection via WebDAV
An attacker can transmit malicious XML data via WebDAV to Yaws, in order to read a file, scan sites, or trigger a denial of service...
Ruby Gon: Cross Site Scripting via MultiJson
An attacker can trigger a Cross Site Scripting via MultiJson of Ruby Gon, in order to run JavaScript code in the context of the web site...
PowerDNS: information disclosure via Zone Records
A local attacker can read a memory fragment via Zone Records of PowerDNS, in order to obtain sensitive information...
MediaWiki: multiple vulnerabilities
An attacker can use several vulnerabilities of MediaWiki...
Fortinet Fortigate: Man-in-the-Middle via Valid SSL-VPN Certificate
An attacker can act as a Man-in-the-Middle via Valid SSL-VPN Certificate on Fortinet Fortigate, in order to read or write data in the session...
Fortinet FortiOS: buffer overflow via SSL VPN
An attacker can trigger a buffer overflow via SSL VPN of Fortinet FortiOS, in order to trigger a denial of service, and possibly to run code...
Cisco Aironet Access Point: overload via Authentication Flood
An attacker can trigger an overload via Authentication Flood of Cisco Aironet Access Point, in order to trigger a denial of service...
Cisco Catalyst 9200: denial of service via Polaris Kernel Jumbo Frame
An attacker can trigger a fatal error via Polaris Kernel Jumbo Frame of Cisco Catalyst 9200, in order to trigger a denial of service...
Fortinet FortiOS: buffer overflow via LCP
An attacker can trigger a buffer overflow via LCP of Fortinet FortiOS, in order to trigger a denial of service, and possibly to run code...
Apple macOS: four vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Cisco IOS: information disclosure via LPWA
An attacker can bypass access restrictions to data via LPWA of Cisco IOS, in order to obtain sensitive information...
Cisco Aironet: denial of service via Ethernet
An attacker can trigger a fatal error via Ethernet of Cisco Aironet, in order to trigger a denial of service...
Cisco Aironet: denial of service via UDP
An attacker can trigger a fatal error via UDP of Cisco Aironet, in order to trigger a denial of service...
Linux kernel: buffer overflow via f2fs_truncate_inline_inode
An attacker can trigger a buffer overflow via f2fs_truncate_inline_inode() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Cisco IOS, IOS XE: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco IOS XE...
F5 BIG-IP: information disclosure via HTTP
An attacker can bypass access restrictions to data via HTTP of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: denial of service via TMM
An attacker can trigger a fatal error via TMM of F5 BIG-IP, in order to trigger a denial of service...
Rails: four vulnerabilities
An attacker can use several vulnerabilities of Rails...
PackageKit: two vulnerabilities
An attacker can use several vulnerabilities of PackageKit...
Aptdaemon: information disclosure via Locale
An attacker can bypass access restrictions to data via Locale of Aptdaemon, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1072 1074 1075 1076 1077 1078 1079 1080 1081 1082