The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Drupal Core: Cross Site Scripting via CKEditor
An attacker can trigger a Cross Site Scripting via CKEditor of Drupal Core, in order to run JavaScript code in the context of the web site...
OpenCV: assertion error via cv-RBaseStream-setPos
An attacker can force an assertion error via cv::RBaseStream::setPos() of OpenCV, in order to trigger a denial of service...
OpenCV: buffer overflow via cv-Jpeg2KDecoder-readComponent8u
An attacker can generate a buffer overflow via cv::Jpeg2KDecoder::readComponent8u() of OpenCV, in order to trigger a denial of service, and possibly to run code...
Cisco UCS Director: privilege escalation via Virtual Machine
An attacker can bypass restrictions via Virtual Machine of Cisco UCS Director, in order to escalate his privileges...
Cisco StarOS: denial of service via Interface Forwarding
An attacker can generate a fatal error via Interface Forwarding of Cisco StarOS, in order to trigger a denial of service...
Cisco IOS XR: denial of service via UDP Broadcast Forwarding
An attacker can generate a fatal error via UDP Broadcast Forwarding of Cisco IOS XR, in order to trigger a denial of service...
Cisco ASA, Cisco AnyConnect: privilege escalation via SAML Authentication Session Fixation
An attacker can bypass restrictions via SAML Authentication Session Fixation of Cisco ASA and Cisco AnyConnect, in order to escalate his privileges...
Cisco ASA: denial of service via Application Layer Protocol Inspection
An attacker can generate a fatal error via Application Layer Protocol Inspection of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via TLS
An attacker can generate a fatal error via TLS of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: denial of service via Flow Creation
An attacker can generate a fatal error via Flow Creation of Cisco ASA, in order to trigger a denial of service...
Cisco ASA: privilege escalation via VPN SSL Certificate Verification
An attacker can bypass restrictions via VPN SSL Certificate Verification of Cisco ASA, in order to escalate his privileges...
Cisco Unified Communications Manager: information disclosure via LDAP
An attacker can bypass access restrictions to data via LDAP of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Unified Communications Manager: information disclosure via Database Tables
An attacker can bypass access restrictions to data via Database Tables of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco StarOS: denial of service via IPsec Manager
An attacker can generate a fatal error via IPsec Manager of Cisco StarOS, in order to trigger a denial of service...
Cisco ASA: Cross Site Scripting via Clientless SSL VPN
An attacker can trigger a Cross Site Scripting via Clientless SSL VPN of Cisco ASA, in order to run JavaScript code in the context of the web site...
Cisco ASA: Cross Site Scripting via WebVPN
An attacker can trigger a Cross Site Scripting via WebVPN of Cisco ASA, in order to run JavaScript code in the context of the web site...
Cisco Wireless LAN Controller: privilege escalation via Default SNMP Community Strings
An attacker can bypass restrictions via Default SNMP Community Strings of Cisco Wireless LAN Controller, in order to escalate his privileges...
Squid cache: denial of service via ESI Response
An attacker can generate a fatal error via ESI Response of Squid cache, in order to trigger a denial of service...
Contao: Cross Site Scripting via Back End System Log
An attacker can trigger a Cross Site Scripting via Back End System Log of Contao, in order to run JavaScript code in the context of the web site...
Google Chrome: multiple vulnerabilities
An attacker can use several vulnerabilities of Google Chrome...
SIMATIC WinCC OA Operator iOS App: information disclosure
An attacker can bypass access restrictions to data of SIMATIC WinCC OA Operator iOS App, in order to obtain sensitive information...
Elasticsearch: Cross Site Scripting via X-Pack Machine Learning
An attacker can trigger a Cross Site Scripting via X-Pack Machine Learning of Elasticsearch, in order to run JavaScript code in the context of the web site...
IBM MQ: memory leak via Publish Subscribe
An attacker can create a memory leak via Publish Subscribe of IBM MQ, in order to trigger a denial of service...
Python Bleach: information disclosure
An attacker can bypass access restrictions to data of Python Bleach, in order to obtain sensitive information...
UnZip: multiple vulnerabilities
An attacker can use several vulnerabilities of UnZip...
librsvg2: out-of-bounds memory reading via rsvg_pattern_fix_fallback
An attacker can force a read at an invalid address via rsvg_pattern_fix_fallback() of librsvg2, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: out-of-bounds memory reading via WriteWEBPImage
An attacker can force a read at an invalid address via WriteWEBPImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
Oracle VM VirtualBox: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of April 2018
Several vulnerabilities were announced in Oracle products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 811 812 813 814 815 816 817 818 819 821 823 824 825 826 827 828 829 830 831 841 861 881 901 921 941 961 981 1001 1005