History of vulnerabilities analyzed by Vigil@nce: Cisco Aironet: directory traversal via CLI Commands An attacker can traverse directories via CLI Commands of Cisco Aironet, in order to read a file outside the service root path... Cisco Aironet: denial of service via Malformed Wireless Client Packets An attacker can trigger a fatal error via Malformed Wireless Client Packets of Cisco Aironet, in order to trigger a denial of service... Cisco Aironet: privilege escalation via Command Injection An attacker can bypass restrictions via Command Injection of Cisco Aironet, in order to escalate his privileges... Cisco Aironet: denial of service via Quality of Service An attacker can trigger a fatal error via Quality of Service of Cisco Aironet, in order to trigger a denial of service... ZoneAlarm Antivirus/Firewall: three vulnerabilities An attacker can use several vulnerabilities of ZoneAlarm Antivirus/Firewall... Node.js typed-function: code execution An attacker can use a vulnerability of Node.js typed-function, in order to run code... Node.js materialize-css: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Node.js materialize-css, in order to run JavaScript code in the context of the web site... Node.js harp: file reading A local attacker can read a file of Node.js harp, in order to obtain sensitive information... jQuery, Symfony: Cross Site Scripting via templates An attacker can trigger a Cross Site Scripting via templates for Symfony, in order to run JavaScript code in the context of the web site... Symfony: read-write access via destructors An attacker can bypass access restrictions via destructors of Symfony, in order to delete or alter data... Jenkins Plugins: multiple vulnerabilities An attacker can use several vulnerabilities of Jenkins Plugins... Drupal TableField: code execution via Object Injection An attacker can use a vulnerability via Object Injection of Drupal TableField, in order to run code... Drupal Stage File Proxy: denial of service via Invalid Files An attacker can trigger a fatal error via Invalid Files of Drupal Stage File Proxy, in order to trigger a denial of service... Symfony, Drupal: privilege escalation via the "remember me" cookie An attacker can bypass restrictions via the "remember me" cookie of Symfony or Drupal, in order to escalate his privileges... Symfony, Drupal: code execution via service IDs An attacker can use a vulnerability via service IDs of Symfony or Drupal, in order to run code... IBM QRadar SIEM: information disclosure An attacker can bypass access restrictions to data of IBM QRadar SIEM, in order to obtain sensitive information... Symfony: Cross Site Request Forgery via X-Http-Method-Override An attacker can trigger a Cross Site Request Forgery via X-Http-Method-Override of Symfony, in order to force the victim to perform operations... SQLite: code execution via Optional Extensions An attacker can use a vulnerability via Optional Extensions of SQLite, in order to run code... Pacemaker: three vulnerabilities An attacker can use several vulnerabilities of Pacemaker... WebKitGTK: information disclosure via Address Bar Spoofing An attacker can bypass access restrictions to data via Address Bar Spoofing of WebKitGTK, in order to obtain sensitive information... WebKitGTK: information disclosure via HTTP Proxy Settings An attacker can bypass access restrictions to data via HTTP Proxy Settings of WebKitGTK, in order to obtain sensitive information... WebKitGTK: multiple vulnerabilities An attacker can use several vulnerabilities of WebKitGTK... OpenEXR: buffer overflow via makeMultiView.cpp An attacker can trigger a buffer overflow via makeMultiView.cpp of OpenEXR, in order to trigger a denial of service, and possibly to run code... IBM MQ: denial of service via TLS Key Renegotiation An attacker can trigger a fatal error via TLS Key Renegotiation of IBM MQ, in order to trigger a denial of service... Oracle VM VirtualBox: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Oracle Solaris: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Oracle MySQL: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 941 961 981 1001 1021 1041 1061 1081 1101 1114