The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 MAD: assertion error via mad_layer_III
An attacker can force an assertion error via mad_layer_III() of MAD, in order to trigger a denial of service...
3 Node.js getcookies: code execution via Backdoor
An attacker can use a vulnerability via Backdoor of Node.js getcookies, in order to run code...
2 OTRS Help Desk: information disclosure via Customer Tickets
An attacker can bypass access restrictions to data via Customer Tickets of OTRS Help Desk, in order to obtain sensitive information...
2 Apache POI: denial of service
An attacker can generate a fatal error of Apache POI, in order to trigger a denial of service...
2 jackson-databind: code execution via Deserializing
An attacker can use a vulnerability via Deserializing of jackson-databind, in order to run code...
2 LibRaw: out-of-bounds memory reading via X3F Property Table List
An attacker can force a read at an invalid address via X3F Property Table List of LibRaw, in order to trigger a denial of service, or to obtain sensitive information...
2 LibRaw: buffer overflow via utf2char
An attacker can generate a buffer overflow via utf2char() of LibRaw, in order to trigger a denial of service, and possibly to run code...
2 Ansible Tower: code execution via Job Template Variables
An attacker can use a vulnerability via Job Template Variables of Ansible Tower, in order to run code...
1 Ansible Tower: privilege escalation via Organization Administrators
An attacker can bypass restrictions via Organization Administrators of Ansible Tower, in order to escalate his privileges...
2 Linux kernel: use after free via do_get_mempolicy
An attacker can force the usage of a freed memory area via do_get_mempolicy() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
2 WebSphere AS: information disclosure via Administrative Console
An attacker can bypass access restrictions to data via Administrative Console of WebSphere AS, in order to obtain sensitive information...
2 Cisco WLC: denial of service via 802.11 Management Frame
An attacker can send malicious 802.11 Management Frame packets to Cisco WLC, in order to trigger a denial of service...
3 Cisco WLC: denial of service via IP Fragment Reassembly
An attacker can generate a fatal error via IP Fragment Reassembly of Cisco WLC, in order to trigger a denial of service...
2 Cisco WLC: information disclosure via REST API
An attacker can bypass access restrictions to data via REST API of Cisco WLC, in order to obtain sensitive information...
2 Cisco IOS XR: denial of service via netconf
An attacker can generate a fatal error via netconf of Cisco IOS XR, in order to trigger a denial of service...
2 Cisco Aironet: denial of service via PPTP
An attacker can generate a fatal error via PPTP of Cisco Aironet, in order to trigger a denial of service...
2 Cisco Aironet: privilege escalation via CWA FlexConnect ACL
An attacker can bypass restrictions via CWA FlexConnect ACL of Cisco Aironet, in order to escalate his privileges...
2 Cisco Aironet: privilege escalation via SSH
An attacker can bypass restrictions via SSH of Cisco Aironet, in order to escalate his privileges...
2 Cisco Aironet 1800: denial of service via 802.11 Association Requests
An attacker can send malicious 802.11 Association Requests packets to Cisco Aironet 1800, in order to trigger a denial of service...
2 Cisco Aironet/WLC: privilege escalation via WebAuth
An attacker can bypass restrictions via WebAuth of Cisco Aironet/WLC, in order to escalate his privileges...
4 Cisco Secure ACS: code execution via Report Component
An attacker can use a vulnerability via Report Component of Cisco Secure ACS, in order to run code...
2 7-Zip: vulnerability via RAR
A vulnerability via RAR of 7-Zip was announced...
2 Puppet Enterprise: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Puppet Enterprise, in order to run JavaScript code in the context of the web site...
2 LibreOffice/OpenOffice: information disclosure via SMB Credentials
An attacker can bypass access restrictions to data via SMB Credential of LibreOffice/OpenOffice, in order to obtain sensitive information...
2 WordPress Form Maker: code execution via Formula Injection
An attacker can use a vulnerability via Formula Injection of WordPress Form Maker, in order to run code...
2 GraphicsMagick: infinite loop via PNG
An attacker can generate an infinite loop via PNG of GraphicsMagick, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 815 816 817 818 819 820 821 822 823 825 827 828 829 830 831 832 833 834 835 841 861 881 901 921 941 961 981 996