The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS: denial of service via LLDP
An attacker can send a malicious LLDP packet to Cisco IOS, in order to trigger a denial of service...
OpenStack Horizon: Cross Site Scripting
An attacker can trigger a Cross Site Scripting via OpenStack Horizon, in order to run JavaScript code in the context of the web site...
wget: file corruption via a redirecton to an FTP URL
An attacker can corrupt an arbitrary file by redirecting an HTTP request to an FTP location...
iperf3: buffer overflow via cjson
An attacker can generate a buffer overflow via cjson of iperf3, in order to trigger a denial of service, and possibly to run code...
Python: header tampering via urllib2, urllib
An attacker can change the HTTP request created by urllib...
Apache Struts: seven vulnerabilities
An attacker can use several vulnerabilities of Apache Struts...
pfSense: shell command execution via the web interface
An attacker can inject a shell command via the web interface of pfSense, in order to run code...
RSA Authentication Manager: vulnerabilities of embedded components
Some vulnerabilities of the software modules included in RSA Authentication Manager were announced...
ImageMagick: buffer overflow
An attacker can generate three buffer overflow of ImageMagick, in order to trigger a denial of service, and possibly to run code...
Skype for Business: information disclosure via the response time
An attacker can measure the response time of the Web authentication of Skype for Business, in order to obtain usernames...
pfSense: Cross Site Scripting via squid
An attacker can trigger a Cross Site Scripting in the log files and the antivirus alerts in pfSense, in order to run JavaScript code in the context of the web site...
ImageMagick: four vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
Python: TLS disabling in smtplib
An attacker can make the creation of a TLS tunnel by the smtplib module of Python, in order to read sent mails...
Fortinet FortiManager / FortiAnalyzer: four vulnerabilities
An attacker can use several vulnerabilities of Fortinet FortiManager / FortiAnalyzer...
Node.js cli: file corruption via well known temporary files
An attacker can create symbolic links where Node.js cli create its temporary files, in order to corrupt files with the privileges of the Node.js server...
Linux kernel: use after free via key_reject_and_link
An attacker can force the usage of a freed memory area via key_reject_and_link of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
TYPO3 Bootstrap Package: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of TYPO3 Bootstrap Package, in order to run JavaScript code in the context of the web site...
Joomla com_enmasse: SQL injection via component
An attacker can use a SQL injection via the page template component of Joomla com_enmasse, in order to read or alter data...
F5 BIG-IP: privilege escalation via EAV
An attacker who can use a script monitoring verification functions (EAV) can change user accounts...
Drupal Views: unauthorized view of statistics
An attacker can view statistics about accesses without having the corresponding permission...
Drupal Core: two vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...
SAP: multiples vulnerabilities of June 2016
An attacker can use several vulnerabilities of SAP products...
LibTIFF: eight vulnerabilities
An attacker can use several vulnerabilities of libtiff...
VMware vCenter Server: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of VMware vCenter Server, in order to run JavaScript code in the context of the web site...
Adobe Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Adobe Flash Player...
Microsoft Windows: denial of service via the Windows search
An attacker can overload the global search service of Microsoft Windows, in order to trigger a denial of service...
Microsoft Windows: three vulnerabilities of kernel drivers
An attacker can use several vulnerabilities of kernel drivers of Microsoft Windows...
Microsoft Windows: privilege escalation via the group policies
An attacker can make a Microsoft Windows box run any command be defining a group policy, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 611 612 613 614 615 616 617 618 619 621 623 624 625 626 627 628 629 630 631 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1050