History of vulnerabilities analyzed by Vigil@nce: Mitel MiVoice 6x00: privilege escalation via Bluetooth Pairing An attacker can bypass restrictions via Bluetooth Pairing of Mitel MiVoice 6x00, in order to escalate his privileges... QEMU: assertion error via eth_get_gso_type An attacker, inside a guest system, can force an assertion error via eth_get_gso_type() of QEMU, in order to trigger a denial of service on the host system... WildFly: memory leak via Host Controller Connect Loop An attacker can create a memory leak via Host Controller Connect Loop of WildFly, in order to trigger a denial of service... CodeMirror: denial of service via Regular Expression An attacker can trigger a fatal error via Regular Expression of CodeMirror, in order to trigger a denial of service... Oracle WebLogic Server: code execution via Console An attacker can use a vulnerability of Oracle WebLogic Server, in order to run code... Linux kernel: denial of service via llcp_sock_connect An attacker can trigger a fatal error via llcp_sock_connect() of the Linux kernel, in order to trigger a denial of service... Linux kernel: memory leak via llcp_sock_connect An attacker can create a memory leak via llcp_sock_connect() of the Linux kernel, in order to trigger a denial of service... Linux kernel: assertion error via llcp_sock_connect An attacker can force an assertion error via llcp_sock_connect() of the Linux kernel, in order to trigger a denial of service... Linux kernel: assertion error via llcp_sock_bind An attacker can force an assertion error via llcp_sock_bind() of the Linux kernel, in order to trigger a denial of service... Windows: privilege escalation via cng.sys An attacker can bypass restrictions via cng.sys of Windows, in order to escalate his privileges... JUnit4: information disclosure via TemporaryFolder An attacker can bypass access restrictions to data via TemporaryFolder of JUnit4, in order to obtain sensitive information... OpenLDAP: NULL pointer dereference via modrdn An attacker can force a NULL pointer to be dereferenced via modrdn of OpenLDAP, in order to trigger a denial of service... Linux kernel: use after free via con_font_op An attacker can force the usage of a freed memory area via con_font_op() of the Linux kernel, in order to trigger a denial of service, and possibly to run code... Wireshark: two vulnerabilities An attacker can use several vulnerabilities of Wireshark... Nessus: privilege escalation An attacker can bypass restrictions of Nessus, in order to escalate his privileges... WordPress Core: multiple vulnerabilities An attacker can use several vulnerabilities of WordPress Core... Lout: buffer overflow via srcnext An attacker can trigger a buffer overflow via srcnext() of Lout, in order to trigger a denial of service, and possibly to run code... Lout: buffer overflow via StringQuotedWord An attacker can trigger a buffer overflow via StringQuotedWord() of Lout, in order to trigger a denial of service, and possibly to run code... tmux: buffer overflow via input_csi_dispatch_sgr_colon An attacker can trigger a buffer overflow via input_csi_dispatch_sgr_colon() of tmux, in order to trigger a denial of service, and possibly to run code... Check Point Endpoint Security Client for Windows: vulnerability A vulnerability of Check Point Endpoint Security Client for Windows was announced... Check Point Security Management: privilege escalation via Internal CA Web Management An attacker can bypass restrictions via Internal CA Web Management of Check Point Security Management, in order to escalate his privileges... DOMPurify: Cross Site Scripting via Serialize Parse Roundtrip An attacker can trigger a Cross Site Scripting via Serialize Parse Roundtrip of DOMPurify, in order to run JavaScript code in the context of the web site... DOMPurify: Cross Site Scripting via InnerHTML Mutation An attacker can trigger a Cross Site Scripting via InnerHTML Mutation of DOMPurify, in order to run JavaScript code in the context of the web site... Pagure: Cross Site Scripting via templates/blame.html An attacker can trigger a Cross Site Scripting via templates/blame.html of Pagure, in order to run JavaScript code in the context of the web site... Tensorflow: multiple vulnerabilities An attacker can use several vulnerabilities of Tensorflow... Linux kernel: overload via KVM Ioapic Lazy EOI An attacker can trigger an overload via KVM Ioapic Lazy EOI of the Linux kernel, in order to trigger a denial of service... Samba: three vulnerabilities An attacker can use several vulnerabilities of Samba... yubihsm-shell: buffer overflow via _send_secure_msg An attacker can trigger a buffer overflow via _send_secure_msg() of yubihsm-shell, in order to trigger a denial of service, and possibly to run code... yubihsm-shell: buffer overflow via yh_create_session An attacker can trigger a buffer overflow via yh_create_session() of yubihsm-shell, in order to trigger a denial of service, and possibly to run code... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1101 1115