The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla Convert Forms: code execution via CSV Injection
An attacker can use a vulnerability via CSV Injection of Joomla Convert Forms, in order to run code...
ZZIPlib: out-of-bounds memory reading via zzip_disk_fread
An attacker can force a read at an invalid address via zzip_disk_fread() of ZZIPlib, in order to trigger a denial of service, or to obtain sensitive information...
ZZIPlib: denial of service via __zzip_parse_root_directory
An attacker can generate a fatal error via __zzip_parse_root_directory() of zziplib, in order to trigger a denial of service...
F5 BIG-IP: denial of service via IPv6 Virtual Servers
An attacker can generate a fatal error via IPv6 Virtual Servers of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via apache_auth_token_mod / mod_auth_f5_auth_token.cpp
An attacker can bypass restrictions via apache_auth_token_mod / mod_auth_f5_auth_token.cpp of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via SOCKS Proxy
An attacker can generate a fatal error via SOCKS Proxy of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: denial of service via vCMP Cavium Nitrox
An attacker can generate a fatal error via vCMP Cavium Nitrox of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via TMUI
An attacker can bypass restrictions via TMUI of F5 BIG-IP, in order to escalate his privileges...
F5 BIG-IP: denial of service via IP Addresses
An attacker can generate a fatal error via IP Addresses of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP AFM/ASM: information disclosure via IP Intelligence Feed List
An attacker can bypass access restrictions to data via IP Intelligence Feed List of F5 BIG-IP AFM/ASM, in order to obtain sensitive information...
F5 BIG-IP: denial of service via HTTP/2
An attacker can generate a fatal error via HTTP/2 of F5 BIG-IP, in order to trigger a denial of service...
F5 BIG-IP PEM: denial of service via Profile
An attacker can generate a fatal error via Profile of F5 BIG-IP PEM, in order to trigger a denial of service...
F5 BIG-IP: denial of service via IPsec Tunnel Endpoint
An attacker can generate a fatal error via IPsec Tunnel Endpoint of F5 BIG-IP, in order to trigger a denial of service...
Linux kernel: denial of service via drivers/scsi/libsas/sas_scsi_host.c
An attacker can generate a fatal error via drivers/scsi/libsas/sas_scsi_host.c of the Linux kernel, in order to trigger a denial of service...
Symantec ProxySG: three vulnerabilities via Management Console
An attacker can use several vulnerabilities via Management Console of Symantec ProxySG...
Junos OS: memory leak via MPLS/VPLS
An attacker can create a memory leak via MPLS/VPLS of Junos OS, in order to trigger a denial of service...
Junos OS: Man-in-the-Middle via Short MacSec Keys
An attacker can act as a Man-in-the-Middle via Short MacSec Keys on Junos OS, in order to read or write data in the session...
Linux kernel: denial of service via handle_emulation_failure
An attacker, inside a guest system, can generate a fatal error via handle_emulation_failure() of the Linux kernel, in order to trigger a denial of service on the host system...
Eclipse Jetty: information disclosure
A local attacker can read a memory fragment of Eclipse Jetty, in order to obtain sensitive information...
Junos OS: denial of service via BGP UPDATE
An attacker can send malicious BGP UPDATE packets to Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via SNMP MIB-II Subagent Daemon
An attacker can generate a fatal error via SNMP MIB-II Subagent Daemon of Junos OS, in order to trigger a denial of service...
Junos OS: privilege escalation via IDP Policies
An attacker can bypass restrictions via IDP Policies of Junos OS, in order to escalate his privileges...
Junos OS: denial of service via NAT-PT
An attacker can generate a fatal error via NAT-PT of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via CLNP
An attacker can send malicious CLNP packets to Junos OS, in order to trigger a denial of service...
LibOFX: memory corruption via Computerinsel Photoline
An attacker can generate a memory corruption via Computerinsel Photoline of LibOFX, in order to trigger a denial of service, and possibly to run code...
Spring Data Commons: denial of service via Unlimited Resource Allocation
An attacker can generate a fatal error via Unlimited Resource Allocation of Spring Data Commons, in order to trigger a denial of service...
Spring Data Commons: code execution via Special Elements
An attacker can use a vulnerability via Special Elements of Spring Data Commons, in order to run code...
Jenkins Core LTS: Cross Site Scripting via Confirmation Dialogs
An attacker can trigger a Cross Site Scripting via Confirmation Dialogs of Jenkins Core LTS, in order to run JavaScript code in the context of the web site...
Jenkins Core LTS: information disclosure via Views / Agents
An attacker can bypass access restrictions to data via Views / Agents of Jenkins Core LTS, in order to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 809 810 811 812 813 814 815 816 817 819 821 822 823 824 825 826 827 828 829 841 861 881 901 921 941 961 981 1001 1021 1041 1048