The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
tcpreplay: buffer overflow via get_l2len
An attacker can trigger a buffer overflow via get_l2len() of tcpreplay, in order to trigger a denial of service, and possibly to run code...
tcpreplay: buffer overflow via MemcmpInterceptorCommon
An attacker can trigger a buffer overflow via MemcmpInterceptorCommon() of tcpreplay, in order to trigger a denial of service, and possibly to run code...
Junos OS EX/QFX: overload via Virtual Chassis Layer 2 Frames
An attacker can trigger an overload via Virtual Chassis Layer 2 Frames of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS SRX/NFX: privilege escalation via Web API Private Key
An attacker can bypass restrictions via Web API Private Key of Junos OS SRX/NFX, in order to escalate his privileges...
Junos OS EX/QFX: overload via EVPN-VXLAN
An attacker can trigger an overload via EVPN-VXLAN of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS EX/QFX: privilege escalation via user-vlan-id
An attacker can bypass restrictions via user-vlan-id of Junos OS EX/QFX, in order to escalate his privileges...
Junos OS SRX: overload via HTTP Application Identification
An attacker can trigger an overload via HTTP Application Identification of Junos OS SRX, in order to trigger a denial of service...
Junos OS: memory leak via SNMP Polling
An attacker can create a memory leak via SNMP Polling of Junos OS, in order to trigger a denial of service...
Junos OS SRX/NFX: denial of service via Local CLI Command
An attacker can trigger a fatal error via Local CLI Command of Junos OS SRX/NFX, in order to trigger a denial of service...
Junos OS Evolved: denial of service via NDP
An attacker can trigger a fatal error via NDP of Junos OS Evolved, in order to trigger a denial of service...
Junos OS MX: denial of service via NAT64 IPv6
An attacker can trigger a fatal error via NAT64 IPv6 of Junos OS MX, in order to trigger a denial of service...
Junos OS PTX/QFX: denial of service via Kernel Routing Table
An attacker can trigger a fatal error via Kernel Routing Table of Junos OS PTX/QFX, in order to trigger a denial of service...
Junos OS: memory leak via EVPN BGP Packets
An attacker can create a memory leak via EVPN BGP Packets of Junos OS, in order to trigger a denial of service...
Centreon Web: multiple vulnerabilities
An attacker can use several vulnerabilities of Centreon Web...
OpenBSD: use after free via ICMP6 Response
An attacker can force the usage of a freed memory area via ICMP6 Response of OpenBSD, in order to trigger a denial of service, and possibly to run code...
IBM Security Directory Server: two vulnerabilities
An attacker can use several vulnerabilities of IBM Security Directory Server...
F5 BIG-IP: information disclosure via IPsec Small Key Length
An attacker can bypass access restrictions to data via IPsec Small Key Length of F5 BIG-IP, in order to obtain sensitive information...
F5 BIG-IP: denial of service via MQTT iRule
An attacker can trigger a fatal error via MQTT iRule of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP AFM: denial of service via L4 Behavioral
An attacker can trigger a fatal error via L4 Behavioral of F5 BIG-IP AFM, in order to trigger a denial of service...
F5 BIG-IP APM: denial of service via SAML Single Logout
An attacker can trigger a fatal error via SAML Single Logout of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP LTM: overload via Client SSL Profile Authentication
An attacker can trigger an overload via Client SSL Profile Authentication of F5 BIG-IP LTM, in order to trigger a denial of service...
F5 BIG-IP ASM: read-write access via Bot Defense
An attacker can bypass access restrictions via Bot Defense of F5 BIG-IP ASM, in order to read or alter data...
F5 BIG-IP: memory leak via HTTP Compression Profile
An attacker can create a memory leak via HTTP Compression Profile of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via TMM OneConnect Profile Virtual Servers
An attacker can trigger a fatal error via TMM OneConnect Profile Virtual Servers of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via DNS Over TCP
An attacker can trigger a fatal error via DNS Over TCP of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP ASM: information disclosure via Referer Header
An attacker can bypass access restrictions to data via Referer Header of F5 BIG-IP ASM, in order to obtain sensitive information...
F5 BIG-IP ASM: Cross Site Scripting via Configuration Utility Response/Blocking
An attacker can trigger a Cross Site Scripting of F5 BIG-IP ASM, in order to run JavaScript code in the context of the web site...
Joomla paGO Commerce: SQL injection
An attacker can use a SQL injection of Joomla paGO Commerce, in order to read or alter data...
FortiClient for Linux: privilege escalation via VCM Engine
An attacker can bypass restrictions via VCM Engine of FortiClient for Linux, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1071 1072 1073 1074 1075 1076 1077 1078 1079 1081 1083 1084 1085 1086 1087 1088 1089 1090 1091 1101 1103