The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Junos OS: denial of service via SNMP Polling
An attacker can trigger a fatal error via SNMP Polling of Junos OS, in order to trigger a denial of service...
Junos OS SRX/NFX: denial of service via Local CLI Command
An attacker can trigger a fatal error via Local CLI Command of Junos OS SRX/NFX, in order to trigger a denial of service...
Junos OS Evolved: denial of service via NDP
An attacker can send malicious NDP packets to Junos OS Evolved, in order to trigger a denial of service...
Junos OS MX: denial of service via NAT64 IPv6
An attacker can trigger a fatal error via NAT64 IPv6 of Junos OS MX, in order to trigger a denial of service...
Junos OS PTX/QFX: denial of service via J-Flow Sampling
An attacker can trigger a fatal error via J-Flow Sampling of Junos OS PTX/QFX, in order to trigger a denial of service...
Junos OS: memory leak via EVPN
An attacker can create a memory leak via EVPN of Junos OS, in order to trigger a denial of service...
Junos OS: information disclosure via MACsec Delay Protection Bypass
An attacker can bypass access restrictions to data via MACsec Delay Protection Bypass of Junos OS, in order to obtain sensitive information...
Junos OS: Cross Site Scripting via J-Web
An attacker can trigger a Cross Site Scripting via J-Web of Junos OS, in order to run JavaScript code in the context of the web site...
Junos OS: denial of service via DHCPv6 Relay
An attacker can trigger a fatal error via DHCPv6 Relay of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via jdhcpd
An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service...
Junos OS EX4300: denial of service via IPv4 Packets
An attacker can trigger a fatal error via IPv4 Packets of Junos OS EX4300, in order to trigger a denial of service...
Junos OS NFX350: information disclosure via Readable Password Hashes
An attacker can bypass access restrictions to data via Readable Password Hashes of Junos OS NFX350, in order to obtain sensitive information...
Junos OS EX2300: denial of service via Layer 2 Interface Multicast Packets
An attacker can trigger a fatal error via Layer 2 Interface Multicast Packets of Junos OS EX2300, in order to trigger a denial of service...
Junos OS MX: denial of service via DNS Filtering
An attacker can trigger a fatal error via DNS Filtering of Junos OS MX, in order to trigger a denial of service...
Junos OS Evolved: privilege escalation via Ignored Log-out-on-disconnect
An attacker can bypass restrictions via Ignored Log-out-on-disconnect of Junos OS Evolved, in order to escalate his privileges...
Junos OS MX/EX: denial of service via IPv6 DDoS Protection Bypass
An attacker can trigger a fatal error via IPv6 DDoS Protection Bypass of Junos OS MX/EX, in order to trigger a denial of service...
Junos OS: privilege escalation via Device Control Daemon
An attacker can bypass restrictions via Device Control Daemon of Junos OS, in order to escalate his privileges...
Junos OS: denial of service via BGP Session Flapping
An attacker can trigger a fatal error via BGP Session Flapping of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via jdhcpd
An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service...
Junos OS MX: denial of service via DNS Filtering
An attacker can trigger a fatal error via DNS Filtering of Junos OS MX, in order to trigger a denial of service...
Junos OS SRX: denial of service via IPSec Spoofed Packets
An attacker can trigger a fatal error via IPSec Spoofed Packets of Junos OS SRX, in order to trigger a denial of service...
Junos OS: code execution via DHCPv6 Relay-Agent
An attacker can use a vulnerability via DHCPv6 Relay-Agent of Junos OS, in order to run code...
Drupal OAuth Server: SQL injection
An attacker can use a SQL injection of Drupal OAuth Server, in order to read or alter data...
WildFly OpenSSL: memory leak via HTTP Session End
An attacker can create a memory leak via HTTP Session End of WildFly OpenSSL, in order to trigger a denial of service...
FasterXML Jackson Databind: external XML entity injection
An attacker can transmit malicious XML data to FasterXML Jackson Databind, in order to read a file, scan sites, or trigger a denial of service...
Percona Server for MySQL: vulnerability
A vulnerability of Percona Server for MySQL was announced...
Apache Shiro: privilege escalation via Crafted HTTP Request
An attacker can bypass restrictions via Crafted HTTP Request of Apache Shiro, in order to escalate his privileges...
Linux kernel: information disclosure via IPsec Unencrypted GENEVE Tunnels
An attacker can bypass access restrictions to data via IPsec Unencrypted GENEVE Tunnels of the Linux kernel, in order to obtain sensitive information...
NetBSD: buffer overflow via USB Network Interface Jumbo Packets
An attacker can trigger a buffer overflow via USB Network Interface Jumbo Packets of NetBSD, in order to trigger a denial of service, and possibly to run code...
McAfee ePolicy Orchestrator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of McAfee ePolicy Orchestrator, in order to run JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1067 1068 1069 1070 1071 1072 1073 1074 1075 1077 1079 1080 1081 1082