The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP: denial of service via IP fragments
An attacker can trigger a fatal error via fragments of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via iControl
An attacker can bypass restrictions via iControl of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via WebSocket
An attacker can trigger a fatal error via WebSocket of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: overload via HTTP/2
An attacker can trigger an overload via HTTP/2 of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via Active Directory
An attacker can bypass restrictions via Active Directory of F5 BIG-IP, in order to escalate his privileges...
Drupal SAML Authentication: privilege escalation via password reset
An attacker can bypass restrictions via password reset of Drupal SAML Authentication, in order to escalate his privileges...
Cisco ASA: denial of service via VPN
An attacker can trigger a fatal error via VPN of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: buffer overflow via Web Services
An attacker can trigger a buffer overflow via Web Services of Cisco ASA, in order to trigger a denial of service, and possibly to run code...
Cisco ASA: denial of service via SIP
An attacker can trigger a fatal error via SIP of Cisco ASA, in order to trigger a denial of service...
gdm: vulnerability
A vulnerability of gdm was announced...
TeamViewer: vulnerability
A vulnerability of TeamViewer was announced...
salt: code execution via snapper
An attacker can use a vulnerability via snapper of salt, in order to run code...
TYPO3 Bootstrap Package: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 Bootstrap Package, in order to run JavaScript code in the context of the web site...
TYPO3 Yoast SEO: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of TYPO3 Yoast SEO, in order to force the victim to perform operations...
TYPO3 Dynamic Content Element: SQL injection
An attacker can use a SQL injection of TYPO3 Dynamic Content Element, in order to read or alter data...
TYPO3 2 Clicks for External Media: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 2 Clicks for External Media, in order to run JavaScript code in the context of the web site...
Google Chrome: seven vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
Gstreamer: multiple vulnerabilities
An attacker can use several vulnerabilities of Gstreamer...
File Roller: information disclosure
An attacker can bypass access restrictions to data of File Roller, in order to obtain sensitive information...
rust: multiple vulnerabilities
An attacker can use several vulnerabilities of rust...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
Apple iOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple iOS...
openSUSE VirtualBox: privilege escalation via autostart
An attacker can bypass restrictions via autostart of openSUSE VirtualBox, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1120 1121 1122 1123 1124 1125 1126 1127 1128 1130 1132 1133