The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Claws Mail: denial of service via imap_scan_tree_recursive
An attacker can trigger a fatal error via imap_scan_tree_recursive() of Claws Mail, in order to trigger a denial of service...
Linux kernel: buffer overflow via Bluetooth HCI Event
An attacker can trigger a buffer overflow via Bluetooth HCI Event of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Linux kernel: information disclosure via Bluetooth A2MP
An attacker can bypass access restrictions to data via Bluetooth A2MP of the Linux kernel, in order to obtain sensitive information...
Linux kernel: memory corruption via Bluetooth L2CAP
An attacker can trigger a memory corruption via Bluetooth L2CAP of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
XnView: code execution via TIFF Image
An attacker can use a vulnerability via TIFF Image of XnView, in order to run code...
Apereo CAS Server: privilege escalation via GAuth Secret Keys
An attacker can bypass restrictions via GAuth Secret Keys of Apereo CAS Server, in order to escalate his privileges...
Junos OS EX/QFX: overload via Virtual Chassis
An attacker can trigger an overload via Virtual Chassis of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS SRX/NFX: privilege escalation via Web API Private Key
An attacker can bypass restrictions via Web API Private Key of Junos OS SRX/NFX, in order to escalate his privileges...
Junos OS EX/QFX: denial of service via EVPN-VXLAN
An attacker can trigger a fatal error via EVPN-VXLAN of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS: denial of service via IPv6
An attacker can send malicious IPv6 packets to Junos OS, in order to trigger a denial of service...
Junos OS EX/QFX: privilege escalation via user-vlan-id
An attacker can bypass restrictions via user-vlan-id of Junos OS EX/QFX, in order to escalate his privileges...
Junos OS SRX: overload via Application Identification
An attacker can trigger an overload via Application Identification of Junos OS SRX, in order to trigger a denial of service...
Junos OS: denial of service via SNMP Polling
An attacker can trigger a fatal error via SNMP Polling of Junos OS, in order to trigger a denial of service...
Junos OS SRX/NFX: denial of service via Local CLI Command
An attacker can trigger a fatal error via Local CLI Command of Junos OS SRX/NFX, in order to trigger a denial of service...
Junos OS Evolved: denial of service via NDP
An attacker can send malicious NDP packets to Junos OS Evolved, in order to trigger a denial of service...
Junos OS MX: denial of service via NAT64 IPv6
An attacker can trigger a fatal error via NAT64 IPv6 of Junos OS MX, in order to trigger a denial of service...
Junos OS PTX/QFX: denial of service via J-Flow Sampling
An attacker can trigger a fatal error via J-Flow Sampling of Junos OS PTX/QFX, in order to trigger a denial of service...
Junos OS: memory leak via EVPN
An attacker can create a memory leak via EVPN of Junos OS, in order to trigger a denial of service...
Junos OS: Cross Site Scripting via J-Web
An attacker can trigger a Cross Site Scripting via J-Web of Junos OS, in order to run JavaScript code in the context of the web site...
Junos OS: denial of service via DHCPv6 Relay
An attacker can trigger a fatal error via DHCPv6 Relay of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via jdhcpd
An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service...
Junos OS EX4300: denial of service via IPv4 Packets
An attacker can trigger a fatal error via IPv4 Packets of Junos OS EX4300, in order to trigger a denial of service...
Junos OS NFX350: information disclosure via Readable Password Hashes
An attacker can bypass access restrictions to data via Readable Password Hashes of Junos OS NFX350, in order to obtain sensitive information...
Junos OS EX2300: denial of service via Layer 2 Interface Multicast Packets
An attacker can trigger a fatal error via Layer 2 Interface Multicast Packets of Junos OS EX2300, in order to trigger a denial of service...
Junos OS MX: denial of service via DNS Filtering
An attacker can trigger a fatal error via DNS Filtering of Junos OS MX, in order to trigger a denial of service...
Junos OS Evolved: privilege escalation via Ignored Log-out-on-disconnect
An attacker can bypass restrictions via Ignored Log-out-on-disconnect of Junos OS Evolved, in order to escalate his privileges...
Junos OS MX/EX: denial of service via IPv6 DDoS Protection Bypass
An attacker can trigger a fatal error via IPv6 DDoS Protection Bypass of Junos OS MX/EX, in order to trigger a denial of service...
Junos OS: privilege escalation via Device Control Daemon
An attacker can bypass restrictions via Device Control Daemon of Junos OS, in order to escalate his privileges...
Junos OS: denial of service via BGP Session Flapping
An attacker can trigger a fatal error via BGP Session Flapping of Junos OS, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1067 1068 1069 1070 1071 1072 1073 1074 1075 1077 1079 1080 1081 1082 1083 1084 1085 1086 1087 1101 1116