The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Junos OS QFX/EX: buffer overflow via FXPC
An attacker can trigger a buffer overflow via FXPC of Junos OS QFX/EX, in order to trigger a denial of service, and possibly to run code...
Junos OS: information disclosure via RPC
An attacker can bypass access restrictions to data via RPC of Junos OS, in order to obtain sensitive information...
Junos OS: privilege escalation via REST API Brute Force
An attacker can bypass restrictions via REST API Brute Force of Junos OS, in order to escalate his privileges...
Junos OS SRX: denial of service via fxp0
An attacker can trigger a fatal error via fxp0 of Junos OS SRX, in order to trigger a denial of service...
Junos OS: denial of service via jdhcpd DHCPv6 Solicit
An attacker can trigger a fatal error via jdhcpd DHCPv6 Solicit of Junos OS, in order to trigger a denial of service...
Junos OS: privilege escalation via internal-n
An attacker can bypass restrictions via internal-n of Junos OS, in order to escalate his privileges...
Junos OS: privilege escalation via OAM Volumes Password Recovery
An attacker can bypass restrictions via OAM Volumes Password Recovery of Junos OS, in order to escalate his privileges...
Junos OS: privilege escalation via gRPC Hardcoded Credentials
An attacker can bypass restrictions via gRPC Hardcoded Credentials of Junos OS, in order to escalate his privileges...
Junos OS SRX: infinite loop via Proxy ARP
An attacker can trigger an infinite loop via Proxy ARP of Junos OS SRX, in order to trigger a denial of service...
Junos Space: information disclosure via Plaintext Password
An attacker can bypass access restrictions to data via Plaintext Password of Junos Space, in order to obtain sensitive information...
Junos OS: denial of service via jdhcpd
An attacker can trigger a fatal error via jdhcpd of Junos OS, in order to trigger a denial of service...
F5 BIG-IP APM: denial of service via URL Classification
An attacker can trigger a fatal error via URL Classification of F5 BIG-IP APM, in order to trigger a denial of service...
F5 BIG-IP: privilege escalation via Secure Vault Unit Key
An attacker can bypass restrictions via Secure Vault Unit Key of F5 BIG-IP, in order to escalate his privileges...
WiFi WPA3: six vulnerabilities
An attacker can use several vulnerabilities of WiFi WPA3...
tar: NULL pointer dereference via pax_decode_header
An attacker can force a NULL pointer to be dereferenced via pax_decode_header() of tar, in order to trigger a denial of service...
Qt: denial of service via PPM Image
An attacker can trigger a fatal error via PPM Image of Qt, in order to trigger a denial of service...
IBM MQ: Man-in-the-Middle via Console
An attacker can act as a Man-in-the-Middle via Console on IBM MQ, in order to read or write data in the session...
IBM API Connect: file reading via Developer Portal File Inclusion
A local attacker can read a file via Developer Portal File Inclusion of IBM API Connect, in order to obtain sensitive information...
IBM API Connect: code execution via Developer Portal Command Injection
An attacker can use a vulnerability via Developer Portal Command Injection of IBM API Connect, in order to run code...
Jenkins Core: two vulnerabilities
An attacker can use several vulnerabilities of Jenkins Core...
Apache Tomcat: code execution via Windows enableCmdLineArguments
An attacker can use a vulnerability via Windows enableCmdLineArguments of Apache Tomcat, in order to run code...
F5 BIG-IP APM: information disclosure via iRule Debug Logged Password
An attacker can bypass access restrictions to data via iRule Debug Logged Password of F5 BIG-IP APM, in order to obtain sensitive information...
Node.js express-cart: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Node.js express-cart, in order to run JavaScript code in the context of the web site...
Node.js harp: file reading
A local attacker can read a file of Node.js harp, in order to obtain sensitive information...
glibc: out-of-bounds memory reading via proceed_next_node
An attacker can force a read at an invalid address via proceed_next_node() of glibc, in order to trigger a denial of service, or to obtain sensitive information...
Forcepoint Email Security: privilege escalation via Hybrid Registration
An attacker can bypass restrictions via Hybrid Registration of Forcepoint Email Security, in order to escalate his privileges...
Forcepoint Email Security: buffer overflow
An attacker can trigger a buffer overflow of Forcepoint Email Security, in order to trigger a denial of service, and possibly to run code...
Joomla Core: three vulnerabilities
An attacker can use several vulnerabilities of Joomla Core...
Microsoft Windows: vulnerabilities of April 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Exchange Server: Spoofing
An attacker can use several vulnerabilities of Microsoft Exchange Server...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 914 915 916 917 918 919 920 921 922 924 926 927 928 929 930 931 932 933 934 941 961 981 1001 1021 1041 1061 1081 1101 1114