History of vulnerabilities analyzed by Vigil@nce: Horde Nag: Cross Site Scripting via Task Lists An attacker can trigger a Cross Site Scripting via Task Lists of Horde Nag, in order to run JavaScript code in the context of the web site... PHP: memory corruption via method_exists An attacker can generate a memory corruption via method_exists() of PHP, in order to trigger a denial of service, and possibly to run code... F5 BIG-IP: denial of service via Large Receive Offload An attacker can generate a fatal error via Large Receive Offload of F5 BIG-IP, in order to trigger a denial of service... Juniper NFX: privilege escalation via Insecure Sshd Configuration An attacker can bypass restrictions via Insecure Sshd Configuration of Juniper NFX, in order to escalate his privileges... Junos OS: denial of service via J-Web An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service... Junos OS: denial of service via Nexthop Index Allocation An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service... Junos OS: denial of service via telnetd An attacker can generate a fatal error via telnetd of Junos OS, in order to trigger a denial of service... Junos OS: denial of service via DHCP IP/Mask An attacker can generate a fatal error via DHCP IP/Mask of Junos OS, in order to trigger a denial of service... Juniper ScreenOS: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Juniper ScreenOS, in order to run JavaScript code in the context of the web site... Juniper MX Series: denial of service via IPv6 Exception An attacker can send malicious IPv6 Exception packets to Juniper MX Series, in order to trigger a denial of service... Junos OS: privilege escalation via DHCP Option 50 An attacker can bypass restrictions via DHCP Option 50 of Junos OS, in order to escalate his privileges... Juniper MX Series: denial of service via L2ALD An attacker can generate a fatal error via L2ALD of Juniper MX Series, in order to trigger a denial of service... Junos OS: denial of service via DHCPv6 An attacker can send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service... Juniper EX4600: denial of service via Ethernet/ARP Storm An attacker can generate a fatal error of Juniper EX4600, in order to trigger a denial of service... Juniper vSRX: privilege escalation via Booted Up An attacker can bypass restrictions via Booted Up of Juniper vSRX, in order to escalate his privileges... Junos OS: code execution via RSH An attacker can use a vulnerability via RSH of Junos OS, in order to run code... Junos OS: denial of service via SIP ALG An attacker can generate a fatal error via SIP ALG of Junos OS, in order to trigger a denial of service... Junos OS: denial of service via MPLS RSVP An attacker can send malicious MPLS RSVP packets to Junos OS, in order to trigger a denial of service... Junos OS: denial of service via MPLS An attacker can send malicious MPLS packets to Junos OS, in order to trigger a denial of service... Junos OS: denial of service via RPD JET An attacker can generate a fatal error via RPD JET of Junos OS, in order to trigger a denial of service... Junos Space Security Director: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Junos Space Security Director, in order to run JavaScript code in the context of the web site... Junos Space: Cross Site Scripting via OpenNMS An attacker can trigger a Cross Site Scripting via OpenNMS of Junos Space, in order to run JavaScript code in the context of the web site... Junos OS: denial of service via MVPN An attacker can send malicious MVPN packets to Junos OS, in order to trigger a denial of service... Junos OS: denial of service via MPLS An attacker can send malicious MPLS packets to Junos OS, in order to trigger a denial of service... Jenkins Core LTS: multiple vulnerabilities An attacker can use several vulnerabilities of Jenkins Core LTS... Drupal NVP Field: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal NVP Field, in order to run JavaScript code in the context of the web site... Drupal Lightbox2: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal Lightbox2, in order to run JavaScript code in the context of the web site... Drupal Search API Solr Search: information disclosure An attacker can bypass access restrictions to data of Drupal Search API Solr Search, in order to obtain sensitive information... Gnulib: buffer overflow via convert_to_decimal An attacker can generate a buffer overflow via convert_to_decimal() of Gnulib, in order to trigger a denial of service, and possibly to run code... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102