The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Aironet: directory traversal via CLI Commands
An attacker can traverse directories via CLI Commands of Cisco Aironet, in order to read a file outside the service root path...
Cisco Aironet: denial of service via Malformed Wireless Client Packets
An attacker can trigger a fatal error via Malformed Wireless Client Packets of Cisco Aironet, in order to trigger a denial of service...
Cisco Aironet: privilege escalation via Command Injection
An attacker can bypass restrictions via Command Injection of Cisco Aironet, in order to escalate his privileges...
Cisco Aironet: denial of service via Quality of Service
An attacker can trigger a fatal error via Quality of Service of Cisco Aironet, in order to trigger a denial of service...
ZoneAlarm Antivirus/Firewall: three vulnerabilities
An attacker can use several vulnerabilities of ZoneAlarm Antivirus/Firewall...
Node.js typed-function: code execution
An attacker can use a vulnerability of Node.js typed-function, in order to run code...
Node.js materialize-css: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js materialize-css, in order to run JavaScript code in the context of the web site...
Node.js harp: file reading
A local attacker can read a file of Node.js harp, in order to obtain sensitive information...
jQuery, Symfony: Cross Site Scripting via templates
An attacker can trigger a Cross Site Scripting via templates for Symfony, in order to run JavaScript code in the context of the web site...
Symfony: read-write access via destructors
An attacker can bypass access restrictions via destructors of Symfony, in order to delete or alter data...
Jenkins Plugins: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Plugins...
Drupal TableField: code execution via Object Injection
An attacker can use a vulnerability via Object Injection of Drupal TableField, in order to run code...
Drupal Stage File Proxy: denial of service via Invalid Files
An attacker can trigger a fatal error via Invalid Files of Drupal Stage File Proxy, in order to trigger a denial of service...
Symfony, Drupal: privilege escalation via the "remember me" cookie
An attacker can bypass restrictions via the "remember me" cookie of Symfony or Drupal, in order to escalate his privileges...
Symfony, Drupal: code execution via service IDs
An attacker can use a vulnerability via service IDs of Symfony or Drupal, in order to run code...
IBM QRadar SIEM: information disclosure
An attacker can bypass access restrictions to data of IBM QRadar SIEM, in order to obtain sensitive information...
Symfony: Cross Site Request Forgery via X-Http-Method-Override
An attacker can trigger a Cross Site Request Forgery via X-Http-Method-Override of Symfony, in order to force the victim to perform operations...
SQLite: code execution via Optional Extensions
An attacker can use a vulnerability via Optional Extensions of SQLite, in order to run code...
Pacemaker: three vulnerabilities
An attacker can use several vulnerabilities of Pacemaker...
WebKitGTK: information disclosure via Address Bar Spoofing
An attacker can bypass access restrictions to data via Address Bar Spoofing of WebKitGTK, in order to obtain sensitive information...
WebKitGTK: information disclosure via HTTP Proxy Settings
An attacker can bypass access restrictions to data via HTTP Proxy Settings of WebKitGTK, in order to obtain sensitive information...
WebKitGTK: multiple vulnerabilities
An attacker can use several vulnerabilities of WebKitGTK...
OpenEXR: buffer overflow via makeMultiView.cpp
An attacker can trigger a buffer overflow via makeMultiView.cpp of OpenEXR, in order to trigger a denial of service, and possibly to run code...
IBM MQ: denial of service via TLS Key Renegotiation
An attacker can trigger a fatal error via TLS Key Renegotiation of IBM MQ, in order to trigger a denial of service...
Oracle VM VirtualBox: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...
Oracle Solaris: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...
Oracle MySQL: vulnerabilities of April 2019
Several vulnerabilities were announced in Oracle products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 916 917 918 919 920 921 922 923 924 926 928 929 930 931 932 933 934 935 936 941 961 981 1001 1021 1041 1061 1081 1101 1114