The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Junos OS: denial of service via SNMP
An attacker can send malicious SNMP packets to Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via MS-MPC
An attacker can generate a fatal error via MS-MPC of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via rpd
An attacker can generate a fatal error via rpd of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via jdhcpd
An attacker can generate a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service...
Junos OS: privilege escalation via SRX IDP
An attacker can bypass restrictions via SRX IDP of Junos OS, in order to escalate his privileges...
Junos OS: privilege escalation via User Login
An attacker can bypass restrictions via User Login of Junos OS, in order to escalate his privileges...
Junos OS: buffer overflow via CLI
An attacker can generate a buffer overflow via CLI of Junos OS, in order to trigger a denial of service, and possibly to run code...
Junos OS: privilege escalation via Local XML Injection
An attacker can bypass restrictions via Local XML Injection of Junos OS, in order to escalate his privileges...
Junos OS: denial of service via Cluster Configuration Synch
An attacker can generate a fatal error via Cluster Configuration Synch of Junos OS, in order to trigger a denial of service...
Node Core: two vulnerabilities
An attacker can use several vulnerabilities of Node Core...
Synology Office: code execution
An attacker can use a vulnerability of Synology Office, in order to run code...
Heimdal Kerberos: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Heimdal Kerberos, in order to read or write data in the session...
nginx: information disclosure via Ranges
An attacker can bypass access restrictions to data via Ranges of nginx, in order to obtain sensitive information...
HPE LoadRunner, Performance Center: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of HPE LoadRunner or HPE Performance Center, in order to run JavaScript code in the context of the web site...
GraphicsMagick: three vulnerabilities
An attacker can use several vulnerabilities of GraphicsMagick...
Mosquitto: file reading
A local attacker can read a file of Mosquitto, in order to obtain sensitive information...
expat: integer overflow via XML_Parse
An attacker can generate an integer overflow via XML_Parse() of expat, in order to trigger a denial of service, and possibly to run code...
YARA: denial of service via _yr_re_emit
An attacker can generate a fatal error via _yr_re_emit() of YARA, in order to trigger a denial of service...
YARA: out-of-bounds memory reading via yr_arena_write_data
An attacker can force a read at an invalid address via yr_arena_write_data() of YARA, in order to trigger a denial of service, or to obtain sensitive information...
bitlbee: two vulnerabilities
An attacker can use several vulnerabilities of bitlbee...
Spice: buffer overflow
An attacker can generate a buffer overflow of Spice, in order to trigger a denial of service, and possibly to run code...
Adobe Flash Player: three vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Microsoft Windows: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Microsoft Windows...
Microsoft Exchange: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Microsoft Exchange...
Microsoft Office/SharePoint: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Microsoft Office and SharePoint...
Microsoft Edge: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Microsoft Edge...
Microsoft .NET Framework: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Microsoft .NET Framework...
Microsoft Internet Explorer: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Internet Explorer...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 722 723 724 725 726 727 728 729 731 733 734 735 736 737 738 739 740 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022