History of vulnerabilities analyzed by Vigil@nce: F5 BIG-IP: denial of service via MPTCP An attacker can trigger a fatal error via MPTCP of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: code execution via Appliance Mode TMUI An attacker can use a vulnerability via Appliance Mode TMUI of F5 BIG-IP, in order to run code... F5 BIG-IP ASM: write access via iControl REST File Upload An attacker can bypass access restrictions via iControl REST File Upload of F5 BIG-IP ASM, in order to prepare an attack or to trigger a denial of service... F5 BIG-IP: code execution via iControl REST An attacker can use a vulnerability via iControl REST of F5 BIG-IP, in order to run code... F5 BIG-IP: denial of service via HTTP/2 Connect An attacker can trigger a fatal error via HTTP/2 Connect of F5 BIG-IP, in order to trigger a denial of service... IBM DB2: read-write access via Insecure File Permissions An attacker can bypass access restrictions via Insecure File Permissions of IBM DB2, in order to read or alter data... Node.js mquery: read-write access via Prototype Pollution An attacker can bypass access restrictions via Prototype Pollution of Node.js mquery, in order to read or alter data... Squid Cache: out-of-bounds memory reading via WCCP Protocol Data An attacker can force a read at an invalid address via WCCP Protocol Data of Squid Cache, in order to trigger a denial of service, or to obtain sensitive information... Linux kernel: privilege escalation via dev_map_init_map An attacker can bypass restrictions via dev_map_init_map() of the Linux kernel, in order to escalate his privileges... LibTIFF: denial of service via tiff2rgba An attacker can trigger a fatal error via tiff2rgba of LibTIFF, in order to trigger a denial of service... libtpms: information disclosure via CryptSym AES Output IV An attacker can bypass access restrictions to data via CryptSym AES Output IV of libtpms, in order to obtain sensitive information... WebSphere AS: directory traversal via JAX-RPC Applications An attacker can traverse directories via JAX-RPC Applications of WebSphere AS, in order to read a file outside the service root path... Windows: vulnerabilities of March 2021 An attacker can use several vulnerabilities of Microsoft products... Git: code execution via Symbolic Links Clean/smudge Filters Cloning An attacker can use a vulnerability via Symbolic Links Clean/smudge Filters Cloning of Git, in order to run code... Microsoft SharePoint: vulnerabilities of March 2021 An attacker can use several vulnerabilities of Microsoft products... Microsoft Office: vulnerabilities of March 2021 An attacker can use several vulnerabilities of Microsoft products... Microsoft Edge EdgeHTML: code execution An attacker can use a vulnerability of Microsoft Edge EdgeHTML, in order to run code... Microsoft 365 Apps for Enterprise: vulnerabilities of March 2021 An attacker can use several vulnerabilities of Microsoft products... Internet Explorer: vulnerabilities of March 2021 An attacker can use several vulnerabilities of Microsoft products... eZ Platform, Ibexa DXP: information disclosure via /user/sessions An attacker can bypass access restrictions to data via /user/sessions of eZ Platform and Ibexa DXP, in order to obtain sensitive information... Ansible Tower: privilege escalation via Playbook Author An attacker can bypass restrictions via Playbook Author of Ansible Tower, in order to escalate his privileges... Privoxy: five vulnerabilities An attacker can use several vulnerabilities of Privoxy... SAP: multiple vulnerabilities of March 2021 An attacker can use several vulnerabilities of SAP products... Siemens SIMATIC S7-PLCSIM: three vulnerabilities An attacker can use several vulnerabilities of Siemens SIMATIC S7-PLCSIM... Siemens RUGGEDCOM RM1224: denial of service via Failed SSH Authentication An attacker can trigger a fatal error via Failed SSH Authentication of Siemens RUGGEDCOM RM1224, in order to trigger a denial of service... Siemens SIMATIC MV400: two vulnerabilities via TCP Stack An attacker can use several vulnerabilities via TCP Stack of Siemens SIMATIC MV400... Siemens RUGGEDCOM RM1224: buffer overflow via STP BPDU Frames An attacker can trigger a buffer overflow via STP BPDU Frames of Siemens RUGGEDCOM RM1224, in order to trigger a denial of service, and possibly to run code... QEMU: memory corruption via sdhci An attacker, inside a guest system, can trigger a memory corruption via sdhci of QEMU, in order to trigger a denial of service, and possibly to run code on the host system... Synology DSM: code execution via Download Station An attacker can use a vulnerability via Download Station of Synology DSM, in order to run code... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125