The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Node.js shave: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js shave, in order to run JavaScript code in the context of the web site...
kubernetes: credential disclosure via rest.AnonymousClientConfig
An attacker can bypass access restrictions to data via rest.AnonymousClientConfig() of kubernetes, in order to obtain sensitive information...
Eclipse Jetty: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Eclipse Jetty, in order to run JavaScript code in the context of the web site...
blueman: privilege escalation via D-Bus
An attacker can bypass restrictions via D-Bus of blueman, in order to escalate his privileges...
Meson: privilege escalation via an executable stack
An attacker can bypass memory access restrictions because Meson wrongly creates an executable stack, in order to escalate his privileges...
Joomla Kunena: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Kunena, in order to run JavaScript code in the context of the web site...
Node.js sequelize: SQL injection
An attacker can use a SQL injection of Node.js sequelize, in order to read or alter data...
Node.js express-brute: denial of service
An attacker can bypass request quota managed by Node.js express-brute, in order to trigger a denial of service...
Node.js sequelize: SQL injection
An attacker can use a SQL injection of Node.js sequelize, in order to read or alter data...
Zabbix: information disclosure via Filter Bypass
An attacker can bypass access restrictions to data via Filter Bypass of Zabbix, in order to obtain sensitive information...
atomic-reactor: information disclosure via exceptions
An attacker can bypass access restrictions to data via exceptions of atomic-reactor, in order to obtain sensitive information...
osbs-client: information disclosure about oauth
An attacker can read the debuf log of osbs-client, in order to obtain sensitive information...
BlackBerry UEM: external XML entity injection
An attacker can transmit malicious XML data to BlackBerry UEM, in order to read a file, scan sites, or trigger a denial of service...
Cisco Wireless LAN Controller: privilege escalation via SSH
An attacker can bypass restrictions via SSH of Cisco Wireless LAN Controller, in order to escalate his privileges...
Cisco Wireless LAN Controller: denial of service via IAPP Message
An attacker can trigger a fatal error via IAPP Message of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Wireless LAN Controller: denial of service via GUI Configuration
An attacker can trigger a fatal error via GUI Configuration of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Wireless LAN Controller: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of Cisco Wireless LAN Controller, in order to force the victim to perform operations...
Cisco Wireless LAN Controller: denial of service via Locally Significant Certificate
An attacker can trigger a fatal error via Locally Significant Certificate of Cisco Wireless LAN Controller, in order to trigger a denial of service...
Cisco Wireless LAN Controller: privilege escalation via Session Identification Management
An attacker can bypass restrictions via Session Identification Management of Cisco Wireless LAN Controller, in order to escalate his privileges...
Cisco UCS B-Series Blade Servers: privilege escalation via CLI
An attacker can bypass restrictions via CLI of Cisco UCS B-Series Blade Servers, in order to escalate his privileges...
Cisco Unified Communications Manager: denial of service via UDS API
An attacker can trigger a fatal error via UDS API of Cisco Unified Communications Manager, in order to trigger a denial of service...
Cisco ASR 9000: privilege escalation via ACL Bypass
An attacker can bypass restrictions via ACL Bypass of Cisco ASR 9000, in order to escalate his privileges...
Cisco IOS XR: denial of service via PIM
An attacker can trigger a fatal error via PIM of Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: denial of service via gRPC
An attacker can trigger a fatal error via gRPC of Cisco IOS XR, in order to trigger a denial of service...
Cisco Email Security Appliance: privilege escalation via Content Filter Bypass
An attacker can bypass restrictions via Content Filter Bypass of Cisco Email Security Appliance, in order to escalate his privileges...
Cisco IOS XR, ASR 9000: privilege escalation via Management Interface Isolation
An attacker can bypass restrictions via Management Interface Isolation of Cisco IOS XR on ASR 9000, in order to escalate his privileges...
Cisco Aironet: privilege escalation via Development Shell
An attacker can bypass restrictions via Development Shell of Cisco Aironet, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 917 918 919 920 921 922 923 924 925 927 929 930 931 932 933 934 935 936 937 941 961 981 1001 1021 1041 1061 1081 1101 1103