The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP APM: privilege escalation via Edge Client Policy Library
An attacker can bypass restrictions via Edge Client Policy Library of F5 BIG-IP APM, in order to escalate his privileges...
F5 BIG-IP: Cross Site Scripting via Configuration Utility Page
An attacker can trigger a Cross Site Scripting via Configuration Utility Page of F5 BIG-IP, in order to run JavaScript code in the context of the web site...
Linux kernel: denial of service via EXTPROC/ICANON
An attacker can generate a fatal error via EXTPROC/ICANON of the Linux kernel, in order to trigger a denial of service...
Audio File: buffer overflow via Expand3To4Module-run
An attacker can generate a buffer overflow via Expand3To4Module::run() of Audio File, in order to trigger a denial of service, and possibly to run code...
Audio File: NULL pointer dereference via ModuleState-setup
An attacker can force a NULL pointer to be dereferenced via ModuleState::setup() of Audio File, in order to trigger a denial of service...
Drupal Search Autocomplete: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Search Autocomplete, in order to run JavaScript code in the context of the web site...
Drupal Workbench Moderation: privilege escalation
An attacker can bypass restrictions of Drupal Workbench Moderation, in order to escalate his privileges...
Drupal HTML Mail: code execution
An attacker can use a vulnerability of Drupal HTML Mail, in order to run code...
Drupal MIME Mail: code execution
An attacker can use a vulnerability of Drupal MIME Mail, in order to run code...
Drupal Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...
Linux kernel: information disclosure via adjust_scalar_min_max_vals
A local attacker can read a memory fragment via adjust_scalar_min_max_vals() of the Linux kernel, in order to obtain sensitive information...
Cisco Wireless LAN Controller: directory traversal via HTTP Request Parameters
An attacker can traverse directories via HTTP Request Parameters of Cisco Wireless LAN Controller, in order to read a file outside the service root path...
Cisco Wireless LAN Controller: information disclosure via Web URL
An attacker can bypass access restrictions to data via Web URL of Cisco Wireless LAN Controller, in order to obtain sensitive information...
Cisco Wireless LAN Controller: privilege escalation via TACACS GUI
An attacker can bypass restrictions via TACACS GUI of Cisco Wireless LAN Controller, in order to escalate his privileges...
Cisco Wireless LAN Controller: information disclosure via CAPWAP
A local attacker can read a memory fragment via CAPWAP of Cisco Wireless LAN Controller, in order to obtain sensitive information...
Cisco Wireless LAN Controller: denial of service via CAPWAP
An attacker can generate a fatal error via CAPWAP of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Wireless LAN Controller: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Wireless LAN Controller, in order to run JavaScript code in the context of the web site...
Cisco Wireless LAN Controller: privilege escalation via Cisco TrustSec Domain
An attacker can bypass restrictions via Cisco TrustSec Domain of Cisco Wireless LAN Controller, in order to escalate his privileges...
Cisco NX-OS: denial of service via SNMP
An attacker can send malicious SNMP packets to Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: denial of service via PTP
An attacker can send malicious PTP packets to Cisco NX-OS, in order to trigger a denial of service...
Cisco NX-OS: denial of service via LLDP
An attacker can generate a fatal error via LLDP of Cisco NX-OS, in order to trigger a denial of service...
Cisco Prime Collaboration Assurance: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Prime Collaboration Assurance, in order to force the victim to perform operations...
Cisco IOS Access Points: denial of service via Timer Corruption
An attacker can generate a fatal error via Timer Corruption of Cisco IOS Access Points, in order to trigger a denial of service...
Cisco Aironet: denial of service via Aggregated Traffic Deadlock
An attacker can generate a fatal error via Aggregated Traffic Deadlock of Cisco Aironet, in order to trigger a denial of service...
Paramiko: privilege escalation
An attacker can bypass restrictions of Paramiko, in order to escalate his privileges...
QEMU: denial of service via qmp_guest_file_read
An attacker can generate a fatal error via qmp_guest_file_read() of QEMU, in order to trigger a denial of service...
ImageMagick: infinite loop via ReadBMPImage
An attacker can generate an infinite loop via ReadBMPImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WritePCXImage
An attacker can create a memory leak via WritePCXImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WritePDBImage
An attacker can create a memory leak via WritePDBImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via WriteSGIImage
An attacker can create a memory leak via WriteSGIImage() of ImageMagick, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 866 867 868 869 870 871 872 873 874 876 878 879 880 881 882 883 884 885 886 901 921 941 961 981 1001 1021 1041 1049