The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco ASA Software: denial of service via File Upload
An attacker can trigger a fatal error via File Upload of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: memory leak via TCP Packet
An attacker can create a memory leak via TCP Packet of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: Cross Site Scripting via Web-Based Management Interface
An attacker can trigger a Cross Site Scripting via Web-Based Management Interface of Cisco ASA Software, in order to run JavaScript code in the context of the web site...
Cisco ASA Software: denial of service via SSL/TLS Session
An attacker can trigger a fatal error via SSL/TLS Session of Cisco ASA Software, in order to trigger a denial of service...
Cisco ASA Software: read-write access via WebVPN HTTP Headers Injection
An attacker can bypass access restrictions via WebVPN HTTP Headers Injection of Cisco ASA Software, in order to read or alter data...
Cisco ASA Software: privilege escalation via Firepower 1000/2100 Secure Boot Bypass
An attacker can bypass restrictions via Firepower 1000/2100 Secure Boot Bypass of Cisco ASA Software, in order to escalate his privileges...
Cisco Meraki MX: privilege escalation via Snort HTTP Detection Bypass
An attacker can bypass restrictions via Snort HTTP Detection Bypass of Cisco Meraki MX, in order to escalate his privileges...
eZ Publish: read-write access via Legacy Shop Module
An attacker can bypass access restrictions via Legacy Shop Module of eZ Publish, in order to read or alter data...
eZ Platform: two vulnerabilities
An attacker can use several vulnerabilities of eZ Platform...
eZ Platform, eZ Publish: code execution via SiteAccessMatchListener
An attacker can use a vulnerability via SiteAccessMatchListener of eZ Platform and eZ Publish, in order to run code...
eZ Platform: vulnerability via DemoBundle/ezdemo VideoJS
A vulnerability via DemoBundle/ezdemo VideoJS of eZ Platform was announced...
eZ Platform: information disclosure via eZ Cloud / Fastly
An attacker can bypass access restrictions to data via eZ Cloud / Fastly of eZ Platform, in order to obtain sensitive information...
Mozilla NSS: vulnerability via Middlebox Compatibility Mode CCS
A vulnerability via Middlebox Compatibility Mode CCS of Mozilla NSS was announced...
Linux kernel: out-of-bounds memory reading via f2fs_fill_dentries
An attacker can force a read at an invalid address via f2fs_fill_dentries() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information...
BlueZ: use after free via gatttool disconnect_cb
An attacker can force the usage of a freed memory area via gatttool disconnect_cb() of BlueZ, in order to trigger a denial of service, and possibly to run code...
Synology DSM: code execution via Media Server
An attacker can use a vulnerability via Media Server of Synology DSM, in order to run code...
Synology DSM: code execution via Download Station
An attacker can use a vulnerability via Download Station of Synology DSM, in order to run code...
Chrome: four vulnerabilities
An attacker can use several vulnerabilities of Chrome...
Oracle Java, OpenJDK: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
Oracle VM VirtualBox: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
RSA BSAFE Micro Edition Suite: out-of-bounds memory reading via ASN.1 Data
An attacker can force a read at an invalid address via ASN.1 Data of RSA BSAFE Micro Edition Suite, in order to trigger a denial of service, or to obtain sensitive information...
Oracle Fusion Middleware: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
Spring Security: read-write access via Signature Wrapping
An attacker can bypass access restrictions via Signature Wrapping of Spring Security, in order to read or alter data...
Apache Camel: code execution via RabbitMQ Java Deserialization
An attacker can use a vulnerability via RabbitMQ Java Deserialization of Apache Camel, in order to run code...
Apache Camel: information disclosure via JMX Rebind Flaw
An attacker can bypass access restrictions to data via JMX Rebind Flaw of Apache Camel, in order to obtain sensitive information...
Apache Camel: code execution via Netty Java Deserialization
An attacker can use a vulnerability via Netty Java Deserialization of Apache Camel, in order to run code...
Tika OneNote Parser: denial of service via System.exit
An attacker can trigger a fatal error via System.exit of Tika OneNote Parser, in order to trigger a denial of service...
Oracle Communications: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1069 1070 1071 1072 1073 1074 1075 1076 1077 1079 1081 1082 1083 1084 1085 1086 1087 1088 1089