The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Junos OS MX: denial of service via jdhcpd
An attacker can trigger a fatal error via jdhcpd of Junos OS MX, in order to trigger a denial of service...
Junos OS: privilege escalation via J-Web Session Fixation
An attacker can bypass restrictions via J-Web Session Fixation of Junos OS, in order to escalate his privileges...
Junos OS: privilege escalation via MGD
An attacker can bypass restrictions via MGD of Junos OS, in order to escalate his privileges...
Junos OS SRX: denial of service via Transit IP Packet
An attacker can trigger a fatal error via Transit IP Packet of Junos OS SRX, in order to trigger a denial of service...
Junos OS: memory leak via Peered BGP Host
An attacker can create a memory leak via Peered BGP Host of Junos OS, in order to trigger a denial of service...
Junos OS SRX: privilege escalation via Veriexec Subsystem
An attacker can bypass restrictions via Veriexec Subsystem of Junos OS SRX, in order to escalate his privileges...
Junos OS MX: denial of service via OSPF State Transition
An attacker can trigger a fatal error via OSPF State Transition of Junos OS MX, in order to trigger a denial of service...
Junos OS SRX: denial of service via SIP ALG
An attacker can trigger a fatal error via SIP ALG of Junos OS SRX, in order to trigger a denial of service...
Junos OS SRX: Man-in-the-Middle via App-id Signature Updates
An attacker can act as a Man-in-the-Middle via App-id Signature Updates on Junos OS SRX, in order to read or write data in the session...
Juniper SBR Carrier: information disclosure via Certificate Generation
An attacker can bypass access restrictions to data via Certificate Generation of Juniper SBR Carrier, in order to obtain sensitive information...
IBM Workload Scheduler: privilege escalation via taskLauncher
An attacker can bypass restrictions via taskLauncher of IBM Workload Scheduler, in order to escalate his privileges...
Suricata: privilege escalation via Security Options
An attacker can bypass restrictions via Security Options of Suricata, in order to escalate his privileges...
Drupal Maxlength: Cross Site Scripting via Filter
An attacker can trigger a Cross Site Scripting via Filter of Drupal Maxlength, in order to run JavaScript code in the context of the web site...
LibTomCrypt: out-of-bounds memory reading via der_decode_utf8_string
An attacker can force a read at an invalid address via der_decode_utf8_string() of LibTomCrypt, in order to trigger a denial of service, or to obtain sensitive information...
libseccomp-golang: privilege escalation via Single Matching Argument
An attacker can bypass restrictions via Single Matching Argument of libseccomp-golang, in order to escalate his privileges...
Magento: multiple vulnerabilities
An attacker can use several vulnerabilities of Magento...
SnapManager for Oracle: information disclosure
An attacker can bypass access restrictions to data of SnapManager for Oracle, in order to obtain sensitive information...
SIMATIC: denial of service via Profinet UDP Packets
An attacker can trigger a fatal error via Profinet UDP Packets of SIMATIC, in order to trigger a denial of service...
SIMATIC IT UADM: privilege escalation via Password Recovery
An attacker can bypass restrictions via Password Recovery of SIMATIC IT UADM, in order to escalate his privileges...
SIMATIC WinAC RTX F 2010: denial of service via Large HTTP Request
An attacker can trigger a fatal error via Large HTTP Request of SIMATIC WinAC RTX F 2010, in order to trigger a denial of service...
SIMATIC: denial of service via IRT
An attacker can trigger a fatal error via IRT of SIMATIC, in order to trigger a denial of service...
Bouncy Castle: denial of service via OutOfMemory ASN.1
An attacker can trigger a fatal error via OutOfMemory ASN.1 of Bouncy Castle, in order to trigger a denial of service...
XnView: two vulnerabilities via WSQ
An attacker can use several vulnerabilities via WSQ of XnView...
Ansible Core: information disclosure via Hardcoded DEBUG Level
An attacker can bypass access restrictions to data via Hardcoded DEBUG Level of Ansible Core, in order to obtain sensitive information...
OpenSSH: integer overflow via Experimental XMSS Key Type
An attacker can trigger an integer overflow via Experimental XMSS Key Type of OpenSSH, in order to trigger a denial of service, and possibly to run code...
Windows: vulnerabilities of October 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft Office: vulnerabilities of October 2019
An attacker can use several vulnerabilities of Microsoft products...
Microsoft IE/Edge: vulnerabilities of October 2019
An attacker can use several vulnerabilities of Microsoft products...
OpenJPEG: buffer overflow via color_apply_icc_profile
An attacker can trigger a buffer overflow via color_apply_icc_profile() of OpenJPEG, in order to trigger a denial of service, and possibly to run code...
SAP: multiple vulnerabilities of October 2019
An attacker can use several vulnerabilities of SAP products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 966 967 968 969 970 971 972 973 974 976 978 979 980 981 982 983 984 985 986 1001 1021 1041 1059