The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco AsyncOS: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Cisco AsyncOS, in order to read or write data in the session...
Cisco ASR 5000: denial of service via IKEv2
An attacker can send malicious IKEv2 packets to Cisco ASR 5000, in order to trigger a denial of service...
Cisco AnyConnect Secure Mobility Client: privilege escalation
An attacker can bypass restrictions of Cisco AnyConnect Secure Mobility Client, in order to escalate his privileges...
Cisco ASR 5000: denial of service via IPv6
An attacker can send malicious IPv6 packets to Cisco ASR 5000, in order to trigger a denial of service...
QEMU: denial of service via cirrus_vga.c
An attacker, inside a guest system, can generate a fatal error via cirrus_vga.c of QEMU, in order to trigger a denial of service on the host system...
GStreamer Plugin: buffer overflow
An attacker can generate a buffer overflow of GStreamer Plugin, in order to trigger a denial of service, and possibly to run code...
GStreamer Plugin: out-of-bounds memory reading
An attacker can force a read at an invalid address of GStreamer Plugin, in order to trigger a denial of service, or to obtain sensitive information...
php-gettext: code execution via select_string
An attacker can use a vulnerability via select_string of php-gettext, in order to run code...
Drupal High-performance JavaScript callback handler: two vulnerabilities
An attacker can use several vulnerabilities of Drupal High-performance JavaScript callback handler...
mapserver: information disclosure
An attacker can bypass access restrictions to data of mapserver, in order to obtain sensitive information...
Joomla JS Jobs: SQL injection
An attacker can use a SQL injection of Joomla JS Jobs, in order to read or alter data...
LibTIFF: integer overflow via bmp2tiff
An attacker can generate an integer overflow via bmp2tiff of LibTIFF, in order to trigger a denial of service, and possibly to run code...
WebSphere AS: Cross Site Scripting via Admin Console
An attacker can trigger a Cross Site Scripting via Admin Console of WebSphere AS, in order to run JavaScript code in the context of the web site...
WebSphere AS: information disclosure via SOAP
An attacker can bypass access restrictions to data via SOAP of WebSphere AS, in order to obtain sensitive information...
FreeBSD: privilege escalation via bhyve
An attacker, inside a guest system, can bypass restrictions via bhyve of FreeBSD, in order to escalate his privileges on the host system...
FreeBSD, NetBSD: buffer overflow via link_ntoa
An attacker can generate a buffer overflow via link_ntoa() of FreeBSD/NetBSD, in order to trigger a denial of service, and possibly to run code...
FreeBSD: code execution via Telnetd Login Argument Injection
An attacker can use a vulnerability via Telnetd Login Argument Injection of FreeBSD, in order to run code...
QEMU: memory leak via virtio_gpu_resource_destroy
An attacker, inside a guest system, can create a memory leak via virtio_gpu_resource_destroy() of QEMU, in order to trigger a denial of service on the host system...
QEMU: memory leak via 9pfs
An attacker, inside a guest system, can create a memory leak via 9pfs of QEMU, in order to trigger a denial of service on the host system...
QEMU: memory leak via ehci_init_transfer
An attacker, inside a guest system, can create a memory leak via ehci_init_transfer() of QEMU, in order to trigger a denial of service on the host system...
NSIS: code execution via DLL Hijacking
An attacker can use a DLL Hijacking of NSIS, in order to run code...
WordPress WA Form Builder: SQL injection
An attacker can use a SQL injection of WordPress WA Form Builder, in order to read or alter data...
WordPress Product Catalog: SQL injection
An attacker can use a SQL injection of WordPress Product Catalog, in order to read or alter data...
WordPress BBS e-Franchise: SQL injection
An attacker can use a SQL injection of WordPress BBS e-Franchise, in order to read or alter data...
GStreamer Plugin: buffer overflow via FLIC
An attacker can generate a buffer overflow via FLIC of GStreamer Plugin, in order to trigger a denial of service, and possibly to run code...
Node.js passport-azure-ad: privilege escalation
An attacker can bypass restrictions of Node.js passport-azure-ad, in order to escalate his privileges...
Node.js galenframework-cli: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js galenframework-cli, in order to read or write data in the session...
Node.js selenium-download: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js selenium-download, in order to read or write data in the session...
Node.js aerospike: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js aerospike, in order to read or write data in the session...
Node.js appium-chromedriver: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Node.js appium-chromedriver, in order to read or write data in the session...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 657 658 659 660 661 662 663 664 665 667 669 670 671 672 673 674 675 676 677 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020