The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js systeminformation: code execution via Command Injection
An attacker can use a vulnerability via Command Injection of Node.js systeminformation, in order to run code...
HCL Domino: information disclosure via XPages
An attacker can bypass access restrictions to data via XPages of HCL Domino, in order to obtain sensitive information...
HCL Notes: buffer overflow
An attacker can trigger a buffer overflow of HCL Notes, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP APM: overload via VDI Plugin
An attacker can trigger an overload via VDI Plugin of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP AFM: denial of service via Protocol Inspection Profile
An attacker can trigger a fatal error via Protocol Inspection Profile of F5 BIG-IP AFM, in order to trigger a denial of service...
F5 BIG-IP ASM: overload via JSON Payload
An attacker can trigger an overload via JSON Payload of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP DNS/GTM: denial of service via DNS Response
An attacker can trigger a fatal error via DNS Response of F5 BIG-IP DNS/GTM, in order to trigger a denial of service...
F5 BIG-IP APM: denial of service via Virtual Server
An attacker can trigger a fatal error via Virtual Server of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP: file reading via iAppsLX REST
A local attacker can read a file via iAppsLX REST of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP ASM: denial of service via AVRD
An attacker can trigger a fatal error via AVRD of F5 BIG-IP ASM, in order to trigger a denial of service...
F5 BIG-IP: denial of service via DNS Requests
An attacker can trigger a fatal error via DNS Requests of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP APM: denial of service via PingAccess
An attacker can trigger a fatal error via PingAccess of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP APM: Cross Site Scripting via Resource Information Page
An attacker can trigger a Cross Site Scripting via Resource Information Page of F5 BIG-IP APM, in order to run JavaScript code in the context of the web site...
F5 BIG-IP: overload via Configuration Utility TLS Request
An attacker can trigger an overload via Configuration Utility TLS Request of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: memory leak via zxfrd
An attacker can create a memory leak via zxfrd of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: information disclosure via TACACS+ Audit Forwarding
An attacker can bypass access restrictions to data via TACACS+ Audit Forwarding of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: Cross Site Scripting via Configuration Utility
An attacker can trigger a Cross Site Scripting via Configuration Utility of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
F5 BIG-IP APM: open redirect via Virtual Server
An attacker can deceive the user via Virtual Server of F5 BIG-IP APM, in order to redirect him to a malicious site...
F5 BIG-IP APM: overload via TMM Instances VPN Users
An attacker can trigger an overload via TMM Instances VPN Users of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP LTM/CGNAT: denial of service via NAT66
An attacker can trigger a fatal error via NAT66 of F5 BIG-IP LTM/CGNAT, in order to trigger a denial of service...
fprint: privilege escalation
An attacker can bypass restrictions of fprint, in order to escalate his privileges...
OpenStack Manila: privilege escalation via ceph_volume_client.py
An attacker can bypass restrictions via ceph_volume_client.py of OpenStack Manila, in order to escalate his privileges...
Sonatype Nexus Repository Manager: external XML entity injection
An attacker can transmit malicious XML data to Sonatype Nexus Repository Manager, in order to read a file, scan sites, or trigger a denial of service...
VideoLAN VLC: multiple vulnerabilities
An attacker can use several vulnerabilities of VideoLAN VLC...
Trend Micro InterScan Web Security Virtual Appliance: multiple vulnerabilities
An attacker can use several vulnerabilities of Trend Micro InterScan Web Security Virtual Appliance...
SolarWinds Orion Platform: code execution via Inserted Backdoor
An attacker can use a vulnerability via Backdoor of SolarWinds Orion Platform, in order to run code (VIGILANCE-ACTU-6441)...
OpenJPEG: buffer overflow via opj_tcd_dc_level_shift_encode
An attacker can trigger a buffer overflow via opj_tcd_dc_level_shift_encode() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
OpenJPEG: buffer overflow via opj_dwt_calc_explicit_stepsizes
An attacker can trigger a buffer overflow via opj_dwt_calc_explicit_stepsizes() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1086 1087 1088 1089 1090 1091 1092 1093 1094 1096 1098 1099 1100 1101 1102 1103 1104