The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS / IOS XE: denial of service via DHCPv4 Option 82 Relay
An attacker can generate a fatal error via DHCPv4 Option 82 Relay of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via DHCPv4 Option 82 Relay
An attacker can generate a fatal error via DHCPv4 Option 82 Relay of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: buffer overflow via DHCPv4 Option 82 Relay
An attacker can generate a buffer overflow via DHCPv4 Option 82 Relay of Cisco IOS / IOS XE, in order to trigger a denial of service, and possibly to run code...
Cisco IOS / IOS XE: code execution via Quality of Service
An attacker can use a vulnerability via Quality of Service of Cisco IOS / IOS XE, in order to run code...
Cisco IOS / IOS XE: code execution via Smart Install
An attacker can use a vulnerability via Smart Install of Cisco IOS / IOS XE, in order to run code...
Cisco IOS XE: privilege escalation via Static Credential
An attacker can bypass restrictions via Static Credential of Cisco IOS XE, in order to escalate his privileges...
Cisco IOS XE: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco IOS XE, in order to escalate his privileges...
Cisco IOS / IOS XE: denial of service via Forwarding Information Base
An attacker can generate a fatal error via Forwarding Information Base of Cisco IOS / IOS XE, in order to trigger a denial of service...
Cisco IOS / IOS XE: denial of service via Bidirectional Forwarding Detection
An attacker can generate a fatal error via Bidirectional Forwarding Detection of Cisco IOS / IOS XE, in order to trigger a denial of service...
Zsh: code execution via Files
An attacker can use a vulnerability via Files of Zsh, in order to run code...
Zsh: denial of service
An attacker can generate a fatal error of Zsh, in order to trigger a denial of service...
IBM MQ: denial of service via Message
An attacker can generate a fatal error via Message of IBM MQ, in order to trigger a denial of service...
Joomla MobileJoomla: privilege escalation
An attacker can bypass restrictions of Joomla MobileJoomla, in order to escalate his privileges...
Intel Processor: information disclosure via BranchScope
An attacker can bypass access restrictions to data via BranchScope of Intel Processor, in order to obtain sensitive information...
Joomla AcySMS: privilege escalation via CSV Injection
An attacker can bypass restrictions via CSV Injection of Joomla AcySMS, in order to escalate his privileges...
Linux kernel: denial of service via KVM PowerPC flush_tmregs_to_thread
An attacker, inside a guest system, can generate a fatal error via KVM PowerPC flush_tmregs_to_thread() of the Linux kernel, in order to trigger a denial of service on the host system...
Slurm: SQL injection via SlurmDBD
An attacker can use a SQL injection via SlurmDBD of Slurm, in order to read or alter data...
Wireshark: use after free via netmonrec_comment_destroy
An attacker can force the usage of a freed memory area via netmonrec_comment_destroy() of Wireshark, in order to trigger a denial of service, and possibly to run code...
GLPI: Cross Site Scripting via front/preference.php
An attacker can trigger a Cross Site Scripting via front/preference.php of GLPI, in order to run JavaScript code in the context of the web site...
Apache Commons Compress: infinite loop
An attacker can generate an infinite loop of Apache Commons Compress, in order to trigger a denial of service...
LibVNCServer: vulnerability via rfbProcessClientNormalMessage
A vulnerability via rfbProcessClientNormalMessage() of LibVNCServer was announced...
OpenSSL: denial of service via Recursive ASN.1
An attacker can generate a fatal error via Recursive ASN.1 of OpenSSL, in order to trigger a denial of service...
OpenSSL: privilege escalation via HP-UX PA-RISC CRYPTO_memcmp
An attacker can bypass restrictions via HP-UX PA-RISC CRYPTO_memcmp() of OpenSSL, in order to escalate his privileges...
Synology DSM: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Synology DSM, in order to run JavaScript code in the context of the web site...
Django: privilege escalation via ModelAdmin.save_as
An attacker can bypass restrictions via ModelAdmin.save_as of Django, in order to escalate his privileges...
Apache Struts: denial of service via REST Plugin
An attacker can generate a fatal error via REST Plugin of Apache Struts, in order to trigger a denial of service...
SIMATIC: code execution via TIM 1531 IRC
An attacker can use a vulnerability via TIM 1531 IRC of SIMATIC, in order to run code...
SIMATIC: denial of service via RPC Service
An attacker can generate a fatal error via RPC Service of SIMATIC, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 803 804 805 806 807 808 809 810 811 813 815 816 817 818 819 820 821 822 823 841 861 881 901 921 941 961 981 1001 1021 1041 1047