History of vulnerabilities analyzed by Vigil@nce: Joomla Convert Forms: code execution via CSV Injection An attacker can use a vulnerability via CSV Injection of Joomla Convert Forms, in order to run code... ZZIPlib: out-of-bounds memory reading via zzip_disk_fread An attacker can force a read at an invalid address via zzip_disk_fread() of ZZIPlib, in order to trigger a denial of service, or to obtain sensitive information... ZZIPlib: denial of service via __zzip_parse_root_directory An attacker can generate a fatal error via __zzip_parse_root_directory() of zziplib, in order to trigger a denial of service... F5 BIG-IP: denial of service via IPv6 Virtual Servers An attacker can generate a fatal error via IPv6 Virtual Servers of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: privilege escalation via apache_auth_token_mod / mod_auth_f5_auth_token.cpp An attacker can bypass restrictions via apache_auth_token_mod / mod_auth_f5_auth_token.cpp of F5 BIG-IP, in order to escalate his privileges... F5 BIG-IP: denial of service via SOCKS Proxy An attacker can generate a fatal error via SOCKS Proxy of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: denial of service via vCMP Cavium Nitrox An attacker can generate a fatal error via vCMP Cavium Nitrox of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: privilege escalation via TMUI An attacker can bypass restrictions via TMUI of F5 BIG-IP, in order to escalate his privileges... F5 BIG-IP: denial of service via IP Addresses An attacker can generate a fatal error via IP Addresses of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP AFM/ASM: information disclosure via IP Intelligence Feed List An attacker can bypass access restrictions to data via IP Intelligence Feed List of F5 BIG-IP AFM/ASM, in order to obtain sensitive information... F5 BIG-IP: denial of service via HTTP/2 An attacker can generate a fatal error via HTTP/2 of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP PEM: denial of service via Profile An attacker can generate a fatal error via Profile of F5 BIG-IP PEM, in order to trigger a denial of service... F5 BIG-IP: denial of service via IPsec Tunnel Endpoint An attacker can generate a fatal error via IPsec Tunnel Endpoint of F5 BIG-IP, in order to trigger a denial of service... Linux kernel: denial of service via drivers/scsi/libsas/sas_scsi_host.c An attacker can generate a fatal error via drivers/scsi/libsas/sas_scsi_host.c of the Linux kernel, in order to trigger a denial of service... Symantec ProxySG: three vulnerabilities via Management Console An attacker can use several vulnerabilities via Management Console of Symantec ProxySG... Junos OS: memory leak via MPLS/VPLS An attacker can create a memory leak via MPLS/VPLS of Junos OS, in order to trigger a denial of service... Junos OS: Man-in-the-Middle via Short MacSec Keys An attacker can act as a Man-in-the-Middle via Short MacSec Keys on Junos OS, in order to read or write data in the session... Linux kernel: denial of service via handle_emulation_failure An attacker, inside a guest system, can generate a fatal error via handle_emulation_failure() of the Linux kernel, in order to trigger a denial of service on the host system... Eclipse Jetty: information disclosure A local attacker can read a memory fragment of Eclipse Jetty, in order to obtain sensitive information... Junos OS: denial of service via BGP UPDATE An attacker can send malicious BGP UPDATE packets to Junos OS, in order to trigger a denial of service... Junos OS: denial of service via SNMP MIB-II Subagent Daemon An attacker can generate a fatal error via SNMP MIB-II Subagent Daemon of Junos OS, in order to trigger a denial of service... Junos OS: privilege escalation via IDP Policies An attacker can bypass restrictions via IDP Policies of Junos OS, in order to escalate his privileges... Junos OS: denial of service via NAT-PT An attacker can generate a fatal error via NAT-PT of Junos OS, in order to trigger a denial of service... Junos OS: denial of service via CLNP An attacker can send malicious CLNP packets to Junos OS, in order to trigger a denial of service... LibOFX: memory corruption via Computerinsel Photoline An attacker can generate a memory corruption via Computerinsel Photoline of LibOFX, in order to trigger a denial of service, and possibly to run code... Spring Data Commons: denial of service via Unlimited Resource Allocation An attacker can generate a fatal error via Unlimited Resource Allocation of Spring Data Commons, in order to trigger a denial of service... Spring Data Commons: code execution via Special Elements An attacker can use a vulnerability via Special Elements of Spring Data Commons, in order to run code... Jenkins Core LTS: Cross Site Scripting via Confirmation Dialogs An attacker can trigger a Cross Site Scripting via Confirmation Dialogs of Jenkins Core LTS, in order to run JavaScript code in the context of the web site... Jenkins Core LTS: information disclosure via Views / Agents An attacker can bypass access restrictions to data via Views / Agents of Jenkins Core LTS, in order to obtain sensitive information... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1104