History of vulnerabilities analyzed by Vigil@nce: PDFResurrect: buffer overflow via pdf_get_version An attacker can trigger a buffer overflow via pdf_get_version() of PDFResurrect, in order to trigger a denial of service, and possibly to run code... QEMU: overload via e1000e Null Packet Descriptor An attacker, inside a guest system, can trigger an overload via e1000e Null Packet Descriptor of QEMU, in order to trigger a denial of service on the host system... containerd: privilege escalation via Shim API Socket An attacker can bypass restrictions via Shim API Socket of containerd, in order to escalate his privileges... musl: buffer overflow via wcsnrtombs An attacker can trigger a buffer overflow via wcsnrtombs() of musl, in order to trigger a denial of service, and possibly to run code... libvips: information disclosure via im_vips2dz An attacker can bypass access restrictions to data via im_vips2dz() of libvips, in order to obtain sensitive information... XStream: code execution via Input Stream An attacker can use a vulnerability via Input Stream of XStream, in order to run code... Linux kernel: use after free via snd_rawmidi_kernel_write1 An attacker can force the usage of a freed memory area via snd_rawmidi_kernel_write1() of the Linux kernel, in order to trigger a denial of service, and possibly to run code... Linux kernel: out-of-bounds memory reading via dbAdjTree An attacker can force a read at an invalid address via dbAdjTree() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information... Ubuntu 20.04: information disclosure via MySQL X Plugin All Interfaces Listening An attacker can bypass access restrictions to data via MySQL X Plugin All Interfaces Listening of Ubuntu 20.04, in order to obtain sensitive information... Python: information disclosure via hmac.compare_digest Timing An attacker can bypass access restrictions to data via hmac.compare_digest Timing of Python, in order to obtain sensitive information... HCL Domino: privilege escalation via LDAP Lockout Policy Bypass An attacker can bypass restrictions via LDAP Lockout Policy Bypass of HCL Domino, in order to escalate his privileges... HCL Domino: privilege escalation via Lockout Policy Bypass An attacker can bypass restrictions via Lockout Policy Bypass of HCL Domino, in order to escalate his privileges... HCL Domino: Cross Site Request Forgery via Login An attacker can trigger a Cross Site Request Forgery via Login of HCL Domino, in order to force the victim to perform operations... HCL Domino: information disclosure via iNotes Cookie Exposure An attacker can bypass access restrictions to data via iNotes Cookie Exposure of HCL Domino, in order to obtain sensitive information... Linux kernel: write access via get_user_pages An attacker can bypass access restrictions via get_user_pages() of the Linux kernel, in order to alter data... Linux kernel: information disclosure via io_uring An attacker can bypass access restrictions to data via io_uring of the Linux kernel, in order to obtain sensitive information... Linux kernel: memory corruption via __split_huge_pmd An attacker can trigger a memory corruption via __split_huge_pmd() of the Linux kernel, in order to trigger a denial of service, and possibly to run code... Linux kernel: use after free via show_numa_stats An attacker can force the usage of a freed memory area via show_numa_stats() of the Linux kernel, in order to trigger a denial of service, and possibly to run code... Eclipse Jetty: privilege escalation via Gzip Request Data Injection An attacker can bypass restrictions via Gzip Request Data Injection of Eclipse Jetty, in order to escalate his privileges... Linux-Pam: privilege escalation via Root Empty Password An attacker can bypass restrictions via Root Empty Password of Linux-Pam, in order to escalate his privileges... Moodle: six vulnerabilities An attacker can use several vulnerabilities of Moodle... x11vnc: read-write access via Shared Memory An attacker can bypass access restrictions via Shared Memory of x11vnc, in order to read or alter data... QEMU: assertion error via usb_packet_map An attacker, inside a guest system, can force an assertion error via usb_packet_map() of QEMU, in order to trigger a denial of service on the host system... QEMU: out-of-bounds memory reading via ohci_service_td An attacker, inside a guest system, can force a read at an invalid address via ohci_service_td() of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system... QEMU: out-of-bounds memory reading via SLiRP ARP/NCSI Packets An attacker, inside a guest system, can force a read at an invalid address via SLiRP ARP/NCSI Packets of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system... swtpm: vulnerability A vulnerability of swtpm was announced... LXML: Cross Site Scripting via escape An attacker can trigger a Cross Site Scripting via escapes of LXML, in order to run JavaScript code in the context of the web site... xdg-utils: information disclosure An attacker can bypass access restrictions to data of xdg-utils, in order to obtain sensitive information... MS WIndows 7, 2008: privilege escalation via registry permissions An attacker can make profit of permissive permission on the MS Windows registry, in order to escalate his privileges... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1104