The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco AnyConnect Secure Mobility Client: corruption of VPN settings
An attacker can change the settings of the VPN in Cisco AnyConnect Secure Mobility Client...
Cisco Content Security Management Appliance, Email Security Appliance, Web Security Appliance: information disclosure via AsyncOS
An attacker can bypass access restrictions to data via AsyncOS of Cisco Content Security Management Appliance, Email Security Appliance, Web Security Appliance, in order to obtain sensitive information...
Cisco SD-WAN vEdge: file corruption via CLI
An attacker can overwrite any file via the CLI of Cisco SD-WAN vEdge...
Cisco SD-WAN vEdge: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco SD-WAN vEdge, in order to escalate his privileges...
Cisco Content Security Management Appliance: privilege escalation
An attacker can bypass restrictions of Cisco Content Security Management Appliance, in order to escalate his privileges...
Cisco Unified Communications Manager: denial of service via JMX
An attacker can trigger a fatal error via JMX of Cisco Unified Communications Manager, in order to trigger a denial of service...
Cisco Web Security Appliance: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Web Security Appliance, in order to run JavaScript code in the context of the web site...
Cisco SD-WAN: denial of service via vDaemon
An attacker can trigger a fatal error via vDaemon of Cisco SD-WAN, in order to trigger a denial of service...
libxml2: use after free via xmlEncodeEntitiesInternal
An attacker can force the usage of a freed memory area via xmlEncodeEntitiesInternal() of libxml2, in order to trigger a denial of service, and possibly to run code...
libxml2: buffer overflow via xmlEncodeEntitiesInternal
An attacker can trigger a buffer overflow via xmlEncodeEntitiesInternal() of libxml2, in order to trigger a denial of service, and possibly to run code...
libxml2: use after free via xmlXIncludeDoProcess
An attacker can force the usage of a freed memory area via xmlXIncludeDoProcess() of libxml2, in order to trigger a denial of service, and possibly to run code...
QEMU: memory overuse via usb-redir
An attacker can trigger an overload via usb-redir of QEMU, in order to trigger a denial of service...
libopenmpt: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of libopenmpt, in order to trigger a denial of service...
Cisco Unified Communications Manager: SQL injection
An attacker can use a SQL injection of Cisco Unified Communications Manager, in order to read or alter data...
Cisco AnyConnect Secure Mobility Client: executing DLL code
An attacker can create a malicious DLL, and then put it in the current directory of Cisco AnyConnect Secure Mobility Client, in order to execute code...
Cisco SD-WAN vEdge: buffer overflow
An attacker can trigger a buffer overflow of Cisco SD-WAN vEdge, in order to trigger a denial of service, and possibly to run code...
Mozilla Firefox for Android: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Mozilla Firefox for Android, in order to run JavaScript code in the context of the web site...
Mozilla Firefox: code execution via Web Render Components
An attacker can use a vulnerability via Web Render Components of Mozilla Firefox, in order to run code...
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
RabbitMQ: two vulnerabilities
An attacker can use several vulnerabilities of RabbitMQ...
NVIDIA drivers: two vulnerabilities
An attacker can use several vulnerabilities of NVIDIA drivers...
avahi: overload
An attacker can trigger an overload of avahi, in order to trigger a denial of service...
OpenEXR: multiple vulnerabilities
An attacker can use several vulnerabilities of OpenEXR...
Kubernetes: privilege escalation
An attacker can bypass restrictions of Kubernetes, in order to escalate his privileges...
Mozilla Firefox and Thunderbird on Windows: privilege escalation via the upgrade service
An attacker can tamper with the upgrade service of Mozilla Firefox on Windows...
yara: multiple vulnerabilities
An attacker can use several vulnerabilities of yara...
libtpms: wrong generation of RSA keys
An attacker can make profit of the bad quality of RSA key generation in libtpms...
pngcheck: division by zero
An attacker can trigger a division by zero in pngcheck...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1123 1124 1125 1126 1127 1128 1129 1130 1131 1133 1135 1136 1137 1138 1139 1140 1141 1142 1143 1147