The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mitel 6869i Voip Deskphone: code execution via tcp/49249
An attacker can use a vulnerability via tcp/49249 of Mitel 6869i Voip Deskphone, in order to run code...
OS-autoinst: vulnerability
A vulnerability of OS-autoinst was announced...
openQA: denial of service via API Requests
An attacker can trigger a fatal error via API Requests of openQA, in order to trigger a denial of service...
UPX: buffer overflow via canUnpack
An attacker can trigger a buffer overflow via canUnpack() of UPX, in order to trigger a denial of service, and possibly to run code...
UPX: integer overflow via getElfSections
An attacker can trigger an integer overflow via getElfSections() of UPX, in order to trigger a denial of service, and possibly to run code...
Linux kernel: use after free via binder_alloc_free_page
An attacker can force the usage of a freed memory area via binder_alloc_free_page() of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
GOsa: privilege escalation via Success Status
An attacker can bypass restrictions via Success Status of GOsa, in order to escalate his privileges...
FortiOS: information disclosure via WEB UI JavaScript Parsing
An attacker can bypass access restrictions to data via WEB UI JavaScript Parsing of FortiOS, in order to obtain sensitive information...
WordPress Import Users From CSV With Meta: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Import Users From CSV With Meta, in order to force the victim to perform operations...
WordPress ACF Better Search: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress ACF Better Search, in order to force the victim to perform operations...
WordPress Deny All Firewall: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Deny All Firewall, in order to force the victim to perform operations...
Exiv2: integer overflow via WebPImage-decodeChunks
An attacker can trigger an integer overflow via WebPImage::decodeChunks() of Exiv2, in order to trigger a denial of service, and possibly to run code...
Exiv2: integer overflow via PngImage-readMetadata
An attacker can trigger an integer overflow via PngImage::readMetadata() of Exiv2, in order to trigger a denial of service, and possibly to run code...
Exiv2: integer overflow via PngImage-readMetadata
An attacker can trigger an integer overflow via PngImage::readMetadata() of Exiv2, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: memory leak via mcpd
An attacker can create a memory leak via mcpd of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: code execution via IRulesLX Debug NodeJS
An attacker can use a vulnerability via IRulesLX Debug NodeJS of F5 BIG-IP, in order to run code...
F5 BIG-IP: privilege escalation via iControl REST
An attacker can bypass restrictions via iControl REST of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via SSL Connection
An attacker can trigger a fatal error via SSL Connection of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via DHCPv6
An attacker can send malicious DHCPv6 packets to F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via FTP Profile Connection Mirroring
An attacker can trigger a fatal error via FTP Profile Connection Mirroring of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: information disclosure via DNS Configuration TSIG Key Secret
An attacker can bypass access restrictions to data via DNS Configuration TSIG Key Secret of F5 BIG-IP, in order to obtain sensitive information...
KDE kconfig: code execution via Desktop Files
An attacker can use a vulnerability via Desktop Files of KDE kconfig, in order to run code...
PostgreSQL: four vulnerabilities
An attacker can use several vulnerabilities of PostgreSQL...
NetBSD: memory leak via IPv6 Neighbor Cache
An attacker can create a memory leak via IPv6 Neighbor Cache of NetBSD, in order to trigger a denial of service...
Node.js Modules: malicious code
Several Node.js modules are malicious, which can be used by an attacker in order to run code...
Cisco IOS XR: denial of service via IS-IS
An attacker can trigger a fatal error via IS-IS of Cisco IOS XR, in order to trigger a denial of service...
Cisco IOS XR: denial of service via IS-IS
An attacker can trigger a fatal error via IS-IS of Cisco IOS XR, in order to trigger a denial of service...
Cisco SD-WAN Solution: privilege escalation via L3/L4 Traffic Filter Bypass
An attacker can bypass restrictions via L3/L4 Traffic Filter Bypass of Cisco SD-WAN Solution, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 947 948 949 950 951 952 953 954 955 957 959 960 961 962 963 964 965 966 967 981 1001 1012