The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Trend Micro InterScan Messaging Security Virtual Appliance: three vulnerabilities
An attacker can use several vulnerabilities of Trend Micro InterScan Messaging Security Virtual Appliance...
Trend Micro OfficeScan: directory traversal
An attacker can traverse directories of Trend Micro OfficeScan, in order to read a file outside the service root path...
Jinja2: vulnerability
A vulnerability of Jinja2 was announced...
FFmpeg: vulnerability
A vulnerability of FFmpeg was announced...
freeimage: buffer overflow via XMP
An attacker can generate a buffer overflow via XMP of freeimage, in order to trigger a denial of service, and possibly to run code...
Symantec Web Gateway: privilege escalation via Management Console
An attacker can use the Management Console of Symantec Web Gateway, in order to escalate his privileges...
FortiAnalyzer, FortiManager: Cross Site Scripting via Report Filters
An attacker can trigger a Cross Site Scripting via Report Filters of FortiAnalyzer or FortiManager, in order to run JavaScript code in the context of the web site...
Apache Tomcat JK ISAPI Connector: buffer overflow via IIS/ISAPI
An attacker can generate a buffer overflow via IIS/ISAPI of Apache Tomcat JK ISAPI Connector, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: Cross Site Scripting via BIGIPAuthUsernameCookie
An attacker can trigger a Cross Site Scripting via BIGIPAuthUsernameCookie of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
Cisco NX-OS: denial of service via BGP
An attacker can send a malicious BGP packet to Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: denial of service via DHCPv4
An attacker can send a malicious DHCPv4 packet to Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: denial of service via DHCPv4
An attacker can send a malicious DHCPv4 packet to Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: code execution via SSH
An attacker can bypass SSH authentication of Cisco NX-OS, in order to run privileged code...
Cisco Nexus 9000: information disclosure via Open Ports
An attacker can connect to open ports of Cisco Nexus 9000, in order to obtain sensitive information...
Cisco Nexus 7000/7700: buffer overflow via OTV UDP
An attacker can generate a buffer overflow via OTV UDP of Cisco Nexus 7000/7700, in order to trigger a denial of service, and possibly to run code...
Cisco IOS XR: privilege escalation via Command-Line Interface
An attacker can bypass restrictions via Command-Line Interface of Cisco IOS XR, in order to escalate his privileges...
Cisco IOS, IOS XE: denial of service via IKEv2
An attacker can send a malicious IKEv2 packet to Cisco IOS or IOS XE, in order to trigger a denial of service...
Cisco IOS: bypassing ACL via TCAM
An attacker can bypass ACE (access control entries) in a PACL (port access control list) of TCAM (ternary content addressable memory) on Cisco IOS, in order to bypass filters on Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers...
Cisco ASA: denial of service via DHCP Relay
An attacker can generate a fatal error via DHCP Relay of Cisco ASA, in order to trigger a denial of service...
Dotclear: file upload via fileUnzip
An attacker can upload a malicious file via fileUnzip on Dotclear, in order for example to upload a Trojan...
Dotclear: spoofing of password reset page
An attacker can define a malicious password reset page for Dotclear, in order to obtain a password entered by a victim...
Joomla Shape 5 MP3 Player: directory traversal
An attacker can traverse directories of Joomla Shape 5 MP3 Player, in order to read a file outside the service root path...
PAN-OS: information disclosure via GlobalProtect Portal
An attacker can use GlobalProtect Portal of PAN-OS, in order to obtain sensitive information...
Wireshark: two vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Links: information disclosure via Unix Domain Sockets
An attacker can bypass access restrictions to data via Unix Domain Sockets of Links, in order to obtain sensitive information...
Linux kernel: use after free via recvmmsg
An attacker can force the usage of a freed memory area via an application using recvmmsg() on the Linux kernel, in order to trigger a denial of service, and possibly to run code...
libav: vulnerability
A vulnerability of libav was announced...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 640 641 642 643 644 645 646 647 648 650 652 653 654 655 656 657 658 659 660 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1012