The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 phpMyAdmin: Cross Site Scripting via Designer Feature
An attacker can trigger a Cross Site Scripting via Designer Feature of phpMyAdmin, in order to run JavaScript code in the context of the web site...
1 AIX: information disclosure via rmsock
A local attacker can read a memory fragment via rmsock of AIX, in order to obtain sensitive information...
2 IBM WebSphere AS: information disclosure via SAML Responses
An attacker can bypass access restrictions to data via SAML Responses of IBM WebSphere Application Server, in order to obtain sensitive information...
2 IBM WebSphere AS Liberty: information disclosure via SAML Web SSO
An attacker can bypass access restrictions to data via SAML Web SSO of IBM WebSphere Application Server Liberty, in order to obtain sensitive information...
2 Joomla Jomres: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Joomla Jomres, in order to force the victim to perform operations...
2 Cisco NX-OS: denial of service via SNMP
An attacker can send malicious SNMP packets to Cisco NX-OS, in order to trigger a denial of service...
2 Cisco NX-OS: privilege escalation via Role-Based Access Control
An attacker can bypass restrictions via Role-Based Access Control of Cisco NX-OS, in order to escalate his privileges...
3 Cisco NX-OS: code execution via IGMP
An attacker can use a vulnerability via IGMP of Cisco NX-OS, in order to run code...
2 Cisco NX-OS: denial of service via Border Gateway Protocol
An attacker can send malicious Border Gateway Protocol packets to Cisco NX-OS, in order to trigger a denial of service...
2 Cisco NX-OS: privilege escalation via Write-Erase Feature
An attacker can bypass restrictions via Write-Erase Feature of Cisco NX-OS, in order to escalate his privileges...
2 Cisco NX-OS: privilege escalation via Role-Based Access
An attacker can bypass restrictions via Role-Based Access of Cisco NX-OS, in order to escalate his privileges...
2 Cisco NX-OS: privilege escalation via NX-API
An attacker can bypass restrictions via NX-API of Cisco NX-OS, in order to escalate his privileges...
2 Cisco NX-OS: denial of service via CDP
An attacker can send malicious CDP packets to Cisco NX-OS, in order to trigger a denial of service...
3 Cisco NX-OS: buffer overflow via NX-API
An attacker can generate a buffer overflow via NX-API of Cisco NX-OS, in order to trigger a denial of service, and possibly to run code...
3 Cisco NX-OS: buffer overflow via Cisco Fabric Services
An attacker can generate a buffer overflow via Cisco Fabric Services of Cisco NX-OS, in order to trigger a denial of service, and possibly to run code...
3 Cisco NX-OS: out-of-bounds memory reading via Cisco Fabric Services
An attacker can force a read at an invalid address via Cisco Fabric Services of Cisco NX-OS, in order to trigger a denial of service, or to obtain sensitive information...
2 Cisco NX-OS: privilege escalation via CLI parser
An attacker can bypass restrictions via CLI parser of Cisco NX-OS, in order to escalate his privileges...
2 Cisco NX-OS: privilege escalation via CLI parser
An attacker can bypass restrictions via CLI parser of Cisco NX-OS, in order to escalate his privileges...
2 Cisco NX-OS: code execution via NX-API
An attacker can use a vulnerability via NX-API of Cisco NX-OS, in order to run code...
1 Cisco Nexus 4000: denial of service via SNMP
An attacker can generate a fatal error via SNMP of Cisco Nexus 4000, in order to trigger a denial of service...
1 Cisco Nexus 3000/9000: denial of service via CLI/SNMP
An attacker can generate a fatal error via CLI/SNMP of Cisco Nexus 3000/9000, in order to trigger a denial of service...
2 Cisco Unified Communications Manager IM and Presence Service: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Unified Communications Manager IM and Presence Service, in order to force the victim to perform operations...
2 Cisco UCS Fabric Interconnect: denial of service via Web UI
An attacker can generate a fatal error via Web UI of Cisco UCS Fabric Interconnect, in order to trigger a denial of service...
2 Cisco UCS Fabric Interconnect: privilege escalation via CLI Parser
An attacker can bypass restrictions via CLI Parser of Cisco UCS Fabric Interconnect, in order to escalate his privileges...
4 Cisco NX-OS: code execution via Cisco Fabric Services
An attacker can use a vulnerability via Cisco Fabric Services of Cisco NX-OS, in order to run code...
3 Cisco NX-OS: code execution via Cisco Discovery Protocol
An attacker can use a vulnerability via Cisco Discovery Protocol of Cisco NX-OS, in order to run code...
4 Cisco NX-OS: code execution via Cisco Fabric Services
An attacker can use a vulnerability via Cisco Fabric Services of Cisco NX-OS, in order to run code...
4 Cisco NX-OS: code execution via Cisco Fabric Services
An attacker can use a vulnerability via Cisco Fabric Services of Cisco NX-OS, in order to run code...
3 Cisco NX-OS: denial of service via Cisco Fabric Services
An attacker can send malicious Cisco Fabric Services packets to Cisco NX-OS, in order to trigger a denial of service...
4 Cisco NX-OS: code execution via Cisco Fabric Services
An attacker can use a vulnerability via Cisco Fabric Services of Cisco NX-OS, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 830 831 832 833 834 835 836 837 838 840 842 843 844 845 846 847 848 849 850 861 881 901 921 941 961 981 996