The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WebSphere AS: memory leak via Request Headers
An attacker can create a memory leak via Request Headers of WebSphere AS, in order to trigger a denial of service...
libzip: information disclosure via File Permissions Change
An attacker can bypass access restrictions to data via File Permissions Change of libzip, in order to obtain sensitive information...
tcpflow: out-of-bounds memory reading via setbit
An attacker can force a read at an invalid address via setbit() of tcpflow, in order to trigger a denial of service, or to obtain sensitive information...
Vixie Cron: use after free via force_rescan_user
An attacker can force the usage of a freed memory area via force_rescan_user() of Vixie Cron, in order to trigger a denial of service, and possibly to run code...
Vixie Cron: denial of service via Unlimited Crontab File
An attacker can trigger a fatal error via Unlimited Crontab File of Vixie Cron, in order to trigger a denial of service...
Vixie Cron: denial of service via Large Crontab File
An attacker can trigger a fatal error via Large Crontab File of Vixie Cron, in order to trigger a denial of service...
Debian cron: privilege escalation via Postinst Script
An attacker can bypass restrictions via Postinst Script of Debian cron, in order to escalate his privileges...
OpenBSD: privilege escalation via Allowed ICMP Packets
An attacker can bypass restrictions via Allowed ICMP Packets of OpenBSD, in order to escalate his privileges...
PyYAML: code execution via yaml.load
An attacker can use a vulnerability via yaml.load() of PyYAML, in order to run code...
McAfee Network Security Manager: privilege escalation via Expired GUI Sessions
An attacker can bypass restrictions via Expired GUI Sessions of McAfee Network Security Manager, in order to escalate his privileges...
McAfee Network Security Manager: information disclosure via Manager Disaster Recovery Passwords
An attacker can bypass access restrictions to data via Manager Disaster Recovery Passwords of McAfee Network Security Manager, in order to obtain sensitive information...
McAfee Network Security Manager: Cross Site Scripting via JQuery
An attacker can trigger a Cross Site Scripting via JQuery of McAfee Network Security Manager, in order to run JavaScript code in the context of the web site...
Cisco IP Phone 8800: directory traversal via SIP Web Management Interface File Upload
An attacker can traverse directories via SIP Web Management Interface File Upload of Cisco IP Phone 8800, in order to write a file outside the service root path...
Cisco IP Phone 8800: denial of service via SIP Web Management Interface File Upload
An attacker can trigger a fatal error via SIP Web Management Interface File Upload of Cisco IP Phone 8800, in order to trigger a denial of service...
Cisco IP Phone 7800/8800: privilege escalation via SIP Web Management Interface Crafted Credentials
An attacker can bypass restrictions via SIP Web Management Interface Crafted Credentials of Cisco IP Phone 7800/8800, in order to escalate his privileges...
Cisco IP Phone 8800: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco IP Phone 8800, in order to force the victim to perform operations...
Cisco IP Phone 8800: privilege escalation via SIP Web Management Interface Crafted URL
An attacker can bypass restrictions via SIP Web Management Interface Crafted URL of Cisco IP Phone 8800, in order to escalate his privileges...
GdkPixBuf: memory corruption via File Folder
An attacker can trigger a memory corruption via File Folder of GdkPixBuf, in order to trigger a denial of service, and possibly to run code...
IBM API Connect: information disclosure via Login Ids
An attacker can bypass access restrictions to data via Login Ids of IBM API Connect, in order to obtain sensitive information...
Drupal Back To Top: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Back To Top, in order to run JavaScript code in the context of the web site...
Drupal AddToAny Share Buttons: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal AddToAny Share Buttons, in order to run JavaScript code in the context of the web site...
Drupal Core: Cross Site Scripting via File Module/Subsystem
An attacker can trigger a Cross Site Scripting via File Module/Subsystem of Drupal Core, in order to run JavaScript code in the context of the web site...
Alcatel-Lucent OmniPCX Enterprise: privilege escalation via WBM Default Authentication
An attacker can bypass restrictions via WBM Default Authentication of Alcatel-Lucent OmniPCX Enterprise, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via Software Image Signature Verification
An attacker can bypass restrictions via Software Image Signature Verification of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via Filesystem Access
An attacker can bypass restrictions via Filesystem Access of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: buffer overflow via Fabric Services
An attacker can trigger a buffer overflow via Fabric Services of Cisco NX-OS, in order to trigger a denial of service, and possibly to run code...
Cisco NX-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 907 908 909 910 911 912 913 914 915 917 919 920 921 922 923 924 925 926 927 941 961 981 1001 1021 1041 1061 1081 1101 1105