The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS, IOS XE: denial of service via TCP HTTP Server
An attacker can trigger a fatal error via TCP HTTP Server of Cisco IOS or IOS XE, in order to trigger a denial of service...
Cisco IP Phone 8800: privilege escalation via Script Injection
An attacker can bypass restrictions via Script Injection of Cisco IP Phone 8800, in order to escalate his privileges...
Cisco IOS, IOS XE: access via SSH VRF
An attacker can bypass restrictions to open a SSH connection via VRF of Cisco IOS or IOS XE, in order to try to authenticate...
Cisco Email Security Appliance: infinite loop via URL Filtering
An attacker can trigger an infinite loop via URL Filtering of Cisco Email Security Appliance, in order to trigger a denial of service...
Cisco Email Security Appliance: memory corruption via S/MIME
An attacker can trigger a memory corruption via S/MIME of Cisco Email Security Appliance, in order to trigger a denial of service, and possibly to run code...
Cisco Unified Communications Manager: information disclosure via Digest Credentials
An attacker can bypass access restrictions to data via Digest Credentials of Cisco Unified Communications Manager, in order to obtain sensitive information...
Cisco Prime Infrastructure: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Cisco Prime Infrastructure, in order to run JavaScript code in the context of the web site...
Cisco ASR 900: denial of service via Broadcast Packets
An attacker can trigger a fatal error via Broadcast Packets of Cisco ASR 900, in order to trigger a denial of service...
Node.js generate-password: information disclosure via Weak PRNG
An attacker can bypass access restrictions to data via Weak PRNG of Node.js generate-password, in order to obtain sensitive information...
SIMATIC S7-1500: denial of service via HTTP
An attacker can trigger a fatal error via HTTP of SIMATIC S7-1500, in order to trigger a denial of service...
SIMATIC S7-300: denial of service via S7 Packets
An attacker can trigger a fatal error via S7 Packets of SIMATIC S7-300, in order to trigger a denial of service...
libbfd: infinite loop via IS_CONTAINED_BY_LMA
An attacker can trigger an infinite loop via IS_CONTAINED_BY_LMA of libbfd, in order to trigger a denial of service...
libbfd: buffer overflow via bfd_elf32_swap_phdr_in
An attacker can trigger a buffer overflow via bfd_elf32_swap_phdr_in() of libbfd, in order to trigger a denial of service, and possibly to run code...
McAfee Web Gateway: denial of service via Proxy Component
An attacker can trigger a fatal error via Proxy Component of McAfee Web Gateway, in order to trigger a denial of service...
Wireshark: five vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
WordPress MapSVG Lite: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress MapSVG Lite, in order to force the victim to perform operations...
Microsoft Visual Studio: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Windows: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
SAP: multiples vulnerabilities of January 2019
An attacker can use several vulnerabilities of SAP products...
Source-to-Image: directory traversal via ExtractTarStreamFromTarReader
An attacker can traverse directories via ExtractTarStreamFromTarReader() of Source-to-Image, in order to create a file outside the service root path...
Jenkins Plugins: privilege escalation via Sandbox Bypass
An attacker can bypass restrictions via Sandbox Bypass of Jenkins Plugins, in order to escalate his privileges...
Linux kernel: information disclosure via mincore
An attacker can bypass access restrictions to data via mincore() of the Linux kernel, in order to obtain sensitive information...
Google Android/Pixel: multiple vulnerabilities of January 2019
An attacker can use several vulnerabilities of Google Android/Pixel...
libgit2: code execution via Hidden Gitmodules File
An attacker can use a vulnerability via Hidden Gitmodules File of libgit2, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 887 888 889 890 891 892 893 894 895 897 899 900 901 902 903 904 905 906 907 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1133