The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS: denial of service via PTP
An attacker can send malicious PTP packets to Cisco IOS, in order to trigger a denial of service...
Cisco IOS XE: privilege escalation via Privileged EXEC Mode Root Shell
An attacker can bypass restrictions via Privileged EXEC Mode Root Shell of Cisco IOS XE, in order to escalate his privileges...
Cisco IOS, IOS XE: memory leak via Plug and Play
An attacker can create a memory leak via Plug and Play of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS, IOS XE: denial of service via OSPFv3
An attacker can generate a fatal error via OSPFv3 of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS XE: privilege escalation via MACsec MKA EAP-TLS Authentication Bypass
An attacker can bypass restrictions via MACsec MKA EAP-TLS Authentication Bypass of Cisco IOS XE, in order to escalate his privileges...
Cisco IOS: memory corruption via Test Commands
An attacker can generate a memory corruption via Test Commands of Cisco IOS, in order to trigger a denial of service, and possibly to run code...
Cisco IOS, IOS XE: denial of service via IPv6 Hop-by-Hop Options
An attacker can generate a fatal error via IPv6 Hop-by-Hop Options of Cisco IOS, IOS XE, in order to trigger a denial of service...
Cisco IOS XE, ASA: denial of service via IPsec
An attacker can generate a fatal error via IPsec of Cisco IOS XE, ASA, in order to trigger a denial of service...
Cisco IOS XE: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco IOS XE, in order to escalate his privileges...
Cisco IOS XE: denial of service via VLAN Errdisable
An attacker can generate a fatal error via VLAN Errdisable of Cisco IOS XE, in order to trigger a denial of service...
Cisco IOS XE: privilege escalation via Digital Signature Verification Bypass
An attacker can bypass restrictions via Digital Signature Verification Bypass of Cisco IOS XE, in order to escalate his privileges...
Cisco IOS, IOS XE: denial of service via Cluster Management Protocol
An attacker can generate a fatal error via Cluster Management Protocol of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco IOS XE: memory leak via Cisco Discovery Protocol
An attacker can create a memory leak via Cisco Discovery Protocol of Cisco IOS XE, in order to trigger a denial of service...
Cisco IOS, IOS XE: memory leak via Cisco Discovery Protocol
An attacker can create a memory leak via Cisco Discovery Protocol of Cisco IOS and IOS XE, in order to trigger a denial of service...
Cisco Catalyst 6800: privilege escalation via Secure Boot Bypass
An attacker can bypass restrictions via Secure Boot Bypass of Cisco Catalyst 6800, in order to escalate his privileges...
Microsoft JET Database Engine: buffer overflow
An attacker can generate a buffer overflow of Microsoft JET Database Engine, in order to trigger a denial of service, and possibly to run code...
389 Directory Server: denial of service via delete_passwdPolicy
An attacker can generate a fatal error via delete_passwdPolicy() of 389 Directory Server, in order to trigger a denial of service...
389 Directory Server: denial of service via Large DN Modify
An attacker can generate a fatal error via Large DN Modify of 389 Directory Server, in order to trigger a denial of service...
Linux kernel: integer overflow via __oom_reap_task_mm
An attacker can generate an integer overflow via __oom_reap_task_mm() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: integer overflow via create_elf_tables
An attacker can generate an integer overflow via create_elf_tables() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Smarty: directory traversal via Template
An attacker can traverse directories via Template of Smarty, in order to read a file outside the service root path...
Python: code execution via shutil-make_archive
An attacker can use a vulnerability via shutil-make_archive() of Python, in order to run code...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Apache httpd: denial of service via HTTP/2 SETTINGS
An attacker can generate a fatal error via HTTP/2 SETTINGS of Apache httpd, in order to trigger a denial of service...
Joomla Regular Labs: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Regular Labs, in order to run JavaScript code in the context of the web site...
mgetty: four vulnerabilities
An attacker can use several vulnerabilities of mgetty...
dom4j: external XML entity injection via XML Injection
An attacker can transmit malicious XML data via XML Injection to dom4j, in order to read a file, scan sites, or trigger a denial of service...
Apple macOS: multiple vulnerabilities
An attacker can use several vulnerabilities of Apple macOS...
pam_pkcs11: privilege escalation via Authentication Replay
An attacker can bypass restrictions via Authentication Replay of pam_pkcs11, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 858 859 860 861 862 863 864 865 866 868 870 871 872 873 874 875 876 877 878 881 901 921 941 961 981 1001 1021