The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
AdPlug: buffer overflow via CxadbmfPlayer-__bmf_convert_stream
An attacker can trigger a buffer overflow via CxadbmfPlayer::__bmf_convert_stream() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: buffer overflow via CmkjPlayer-load
An attacker can trigger a buffer overflow via CmkjPlayer::load() of AdPlug, in order to trigger a denial of service, and possibly to run code...
AdPlug: use after free via Cu6mPlayer
An attacker can force the usage of a freed memory area via Cu6mPlayer of AdPlug, in order to trigger a denial of service, and possibly to run code...
lldp: memory leak
An attacker can create a memory leak of lldp, in order to trigger a denial of service...
lldpd: buffer overflow via lldp_decode
An attacker can trigger a buffer overflow via lldp_decode() of lldpd, in order to trigger a denial of service, and possibly to run code...
OpenBSD: use after free via Carp Interface Bpf
An attacker can force the usage of a freed memory area via Carp Interface Bpf of OpenBSD, in order to trigger a denial of service, and possibly to run code...
Junos OS: privilege escalation via SUID Binaries
An attacker can bypass restrictions via SUID Binaries of Junos OS, in order to escalate his privileges...
Junos OS QFX: overload via IP Multicast Traffic Loop
An attacker can trigger an overload via IP Multicast Traffic Loop of Junos OS QFX, in order to trigger a denial of service...
Juniper Junos Space: information disclosure via Clear Text Shared Secrets
An attacker can bypass access restrictions to data via Clear Text Shared Secrets of Juniper Junos Space, in order to obtain sensitive information...
Junos OS: privilege escalation via Request System Software
An attacker can bypass restrictions via Request System Software of Junos OS, in order to escalate his privileges...
Junos OS: privilege escalation via License Check Daemon
An attacker can bypass restrictions via License Check Daemon of Junos OS, in order to escalate his privileges...
Junos OS EX/QFX: memory leak via DHCP Packets
An attacker can create a memory leak via DHCP Packets of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS EX/QFX/SRX: memory leak via 802.1X Authenticator Port Interface Flaps
An attacker can create a memory leak via 802.1X Authenticator Port Interface Flaps of Junos OS EX/QFX/SRX, in order to trigger a denial of service...
Junos OS: denial of service via BGP FlowSpec Message
An attacker can trigger a fatal error via BGP FlowSpec Message of Junos OS, in order to trigger a denial of service...
Junos OS: privilege escalation via J-Web
An attacker can bypass restrictions via J-Web of Junos OS, in order to escalate his privileges...
Junos OS Evolved: denial of service via BGP Update REGEX
An attacker can trigger a fatal error via BGP Update REGEX of Junos OS Evolved, in order to trigger a denial of service...
Junos OS: denial of service via Bidirectional LSP RSVP
An attacker can trigger a fatal error via Bidirectional LSP RSVP of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via Conflict Interpretation
An attacker can trigger a fatal error via Conflict Interpretation of Junos OS, in order to trigger a denial of service...
Junos OS NFX/SRX: denial of service via SSL Proxy Packets
An attacker can trigger a fatal error via SSL Proxy Packets of Junos OS NFX/SRX, in order to trigger a denial of service...
Junos OS MX: denial of service via Dynamic Filter IPv6 Prefix
An attacker can trigger a fatal error via Dynamic Filter IPv6 Prefix of Junos OS MX, in order to trigger a denial of service...
Junos OS EX/QFX: denial of service via Protocol Packets
An attacker can trigger a fatal error via Protocol Packets of Junos OS EX/QFX, in order to trigger a denial of service...
Junos OS EX/QFX5K: denial of service via Storm Control Bypass
An attacker can trigger a fatal error via Storm Control Bypass of Junos OS EX/QFX5K, in order to trigger a denial of service...
Junos OS MX/EX: memory leak via Trio-based MPC IRB
An attacker can create a memory leak via Trio-based MPC IRB of Junos OS MX/EX, in order to trigger a denial of service...
Palo Alto PAN-OS: information disclosure via Ethernet Data Frame Construction
A local attacker can read a memory fragment via Ethernet Data Frame Construction of Palo Alto PAN-OS, in order to obtain sensitive information...
Palo Alto PAN-OS: information disclosure via Log Forwarding Configuration Secrets
An attacker can bypass access restrictions to data via Log Forwarding Configuration Secrets of Palo Alto PAN-OS, in order to obtain sensitive information...
Autobahn: spoofing via Redirect Header Injection
An attacker can create spoofed data via Redirect Header Injection of Autobahn, in order to deceive the victim...
Cisco ASR 500: file reading via SFTP
A local attacker can read a file via SFTP of Cisco ASR 500, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1092 1093 1094 1095 1096 1097 1098 1099 1100 1102 1104 1105 1106 1107 1108 1109 1110 1111 1112 1114