The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
F5 BIG-IP: information disclosure via UCS Backup File Secret
An attacker can bypass access restrictions to data via UCS Backup File Secret of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: read-write access via TMOS Shell
An attacker can bypass access restrictions via TMOS Shell of F5 BIG-IP, in order to read or alter data...
F5 BIG-IP: denial of service via TCP Congestion Control Settings
An attacker can trigger a fatal error via TCP Congestion Control Settings of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via Packet Filter
An attacker can trigger a fatal error via Packet Filter of F5 BIG-IP, in order to trigger a denial of service...
Node.js nextcloud-vue-collections: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js nextcloud-vue-collections, in order to run JavaScript code in the context of the web site...
PAN-OS on PA-7000: privilege escalation via LFC / SMC
An attacker can bypass restrictions via LFC / SMC of PAN-OS on PA-7000, in order to escalate his privileges...
F5 BIG-IP DNS: information disclosure via TSIG Key Secret
An attacker can bypass access restrictions to data via TSIG Key Secret of F5 BIG-IP DNS, in order to obtain sensitive information...
F5 BIG-IP ASM: privilege escalation via Cloud Security Services X.509 Certificate
An attacker can bypass restrictions via Cloud Security Services X.509 Certificate of F5 BIG-IP ASM, in order to escalate his privileges...
VMware Workstation: executing DLL code via Cortado Thinprint
An attacker can create a malicious Cortado Thinprint DLL, and then put it in the current directory of VMware Workstation, in order to execute code...
IBM MQ: denial of service via Data Conversion FDC
An attacker can trigger a fatal error via Data Conversion FDC of IBM MQ, in order to trigger a denial of service...
Cyrus SASL: buffer overflow via _sasl_add_string
An attacker can trigger a buffer overflow via _sasl_add_string() of Cyrus SASL, in order to trigger a denial of service, and possibly to run code...
Sudo: privilege escalation via Blocked User
An attacker can bypass restrictions via Blocked User of Sudo, in order to escalate his privileges...
Sudo: privilege escalation via Nonexistent User
An attacker can bypass restrictions via Nonexistent User of Sudo, in order to escalate his privileges...
OpenBSD: file reading via ftp Redirect
A local attacker can read a file via ftp Redirect of OpenBSD, in order to obtain sensitive information...
OpenBSD: buffer overflow via ripd
An attacker can trigger a buffer overflow via ripd of OpenBSD, in order to trigger a denial of service, and possibly to run code...
Apache Commons Collections: code execution via InvokerTransformer
An attacker can use a vulnerability via InvokerTransformer of Apache Commons Collections, in order to run code...
WebSphere AS: denial of service via Request Headers
An attacker can trigger a fatal error via Request Headers of WebSphere AS, in order to trigger a denial of service...
Apache Tika: three vulnerabilities
An attacker can use several vulnerabilities of Apache Tika...
Cyrus IMAP: privilege escalation via Sieve Script Fileinto Directive
An attacker can bypass restrictions via Sieve Script Fileinto Directive of Cyrus IMAP, in order to escalate his privileges...
Dell EMC Avamar: two vulnerabilities
An attacker can use several vulnerabilities of Dell EMC Avamar...
Dell EMC Unisphere for PowerMax: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Dell EMC Unisphere for PowerMax, in order to run JavaScript code in the context of the web site...
SUSE LE: file corruption via trousers
A local attacker can create a symbolic link during the installation or the update of the trousers package, in order to alter the pointed file, with root privileges...
Python: denial of service via http.cookiejar ReDoS
An attacker can trigger a fatal error via http.cookiejar ReDoS of Python, in order to trigger a denial of service...
Apache Log4j 1.2: code execution via Socket Server Deserialization
An attacker can use a vulnerability via Socket Server Deserialization of Apache Log4j 1.2, in order to run code...
Django: privilege escalation via Model Admin Inlines
An attacker can bypass restrictions via Model Admin Inlines of Django, in order to escalate his privileges...
Drupal Core: four vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 988 989 990 991 992 993 994 995 996 998 1000 1001 1002 1003 1004 1005