The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Horde Nag: Cross Site Scripting via Task Lists
An attacker can trigger a Cross Site Scripting via Task Lists of Horde Nag, in order to run JavaScript code in the context of the web site...
PHP: memory corruption via method_exists
An attacker can generate a memory corruption via method_exists() of PHP, in order to trigger a denial of service, and possibly to run code...
F5 BIG-IP: denial of service via Large Receive Offload
An attacker can generate a fatal error via Large Receive Offload of F5 BIG-IP, in order to trigger a denial of service...
Juniper NFX: privilege escalation via Insecure Sshd Configuration
An attacker can bypass restrictions via Insecure Sshd Configuration of Juniper NFX, in order to escalate his privileges...
Junos OS: denial of service via J-Web
An attacker can generate a fatal error via J-Web of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via Nexthop Index Allocation
An attacker can generate a fatal error via Nexthop Index Allocation of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via telnetd
An attacker can generate a fatal error via telnetd of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via DHCP IP/Mask
An attacker can generate a fatal error via DHCP IP/Mask of Junos OS, in order to trigger a denial of service...
Juniper ScreenOS: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Juniper ScreenOS, in order to run JavaScript code in the context of the web site...
Juniper MX Series: denial of service via IPv6 Exception
An attacker can send malicious IPv6 Exception packets to Juniper MX Series, in order to trigger a denial of service...
Junos OS: privilege escalation via DHCP Option 50
An attacker can bypass restrictions via DHCP Option 50 of Junos OS, in order to escalate his privileges...
Juniper MX Series: denial of service via L2ALD
An attacker can generate a fatal error via L2ALD of Juniper MX Series, in order to trigger a denial of service...
Junos OS: denial of service via DHCPv6
An attacker can send malicious DHCPv6 packets to Junos OS, in order to trigger a denial of service...
Juniper EX4600: denial of service via Ethernet/ARP Storm
An attacker can generate a fatal error of Juniper EX4600, in order to trigger a denial of service...
Juniper vSRX: privilege escalation via Booted Up
An attacker can bypass restrictions via Booted Up of Juniper vSRX, in order to escalate his privileges...
Junos OS: code execution via RSH
An attacker can use a vulnerability via RSH of Junos OS, in order to run code...
Junos OS: denial of service via SIP ALG
An attacker can generate a fatal error via SIP ALG of Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via MPLS RSVP
An attacker can send malicious MPLS RSVP packets to Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via MPLS
An attacker can send malicious MPLS packets to Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via RPD JET
An attacker can generate a fatal error via RPD JET of Junos OS, in order to trigger a denial of service...
Junos Space Security Director: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Junos Space Security Director, in order to run JavaScript code in the context of the web site...
Junos Space: Cross Site Scripting via OpenNMS
An attacker can trigger a Cross Site Scripting via OpenNMS of Junos Space, in order to run JavaScript code in the context of the web site...
Junos OS: denial of service via MVPN
An attacker can send malicious MVPN packets to Junos OS, in order to trigger a denial of service...
Junos OS: denial of service via MPLS
An attacker can send malicious MPLS packets to Junos OS, in order to trigger a denial of service...
Jenkins Core LTS: multiple vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core LTS...
Drupal NVP Field: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal NVP Field, in order to run JavaScript code in the context of the web site...
Drupal Lightbox2: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Drupal Lightbox2, in order to run JavaScript code in the context of the web site...
Drupal Search API Solr Search: information disclosure
An attacker can bypass access restrictions to data of Drupal Search API Solr Search, in order to obtain sensitive information...
Gnulib: buffer overflow via convert_to_decimal
An attacker can generate a buffer overflow via convert_to_decimal() of Gnulib, in order to trigger a denial of service, and possibly to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 863 864 865 866 867 868 869 870 871 873 875 876 877 878 879 880 881 882 883 901 921 941 961 981 1001 1020