History of vulnerabilities analyzed by Vigil@nce: qpid-cpp: denial of service via AMQP An attacker can force an assertion error in AMQP of qpid-cpp, in order to trigger a denial of service... libmodbus: buffer overflow An attacker can generate a buffer overflow of libmodbus, in order to trigger a denial of service, and possibly to run code... Drupal Scald File: file upload An attacker can upload a malicious file on Drupal Scald File, in order for example to upload a Trojan... Rails: two vulnerabilities of Action Pack An attacker can use several vulnerabilities of Action Pack of Rails... libotr: integer overflow An attacker can generate an integer overflow of libotr, in order to trigger a denial of service, and possibly to run code... ISC BIND: three vulnerabilities An attacker can use several vulnerabilities of ISC BIND... Cisco ASA 5500: memory leak via CSC-SSM An attacker can create a memory leak in CSC-SSM of Cisco ASA 5500, in order to trigger a denial of service... Linux kernel: NULL pointer dereference via digi_acceleport An attacker can force a NULL pointer to be dereferenced in the digi_acceleport() function of the Linux kernel, in order to trigger a denial of service... Linux kernel: NULL pointer dereference via wacom An attacker can force a NULL pointer to be dereferenced in the wacom driver of the Linux kernel, in order to trigger a denial of service... Linux kernel: NULL pointer dereference via mct_u232 An attacker can force a NULL pointer to be dereferenced in the mct_u232() function of the Linux kernel, in order to trigger a denial of service... Linux kernel: NULL pointer dereference via cypress_m8 An attacker can force a NULL pointer to be dereferenced in the cypress_m8() function of the Linux kernel, in order to trigger a denial of service... Linux kernel: NULL pointer dereference via cdc_acm An attacker can force a NULL pointer to be dereferenced in the cdc_acm() function of the Linux kernel, in order to trigger a denial of service... Google Chrome: three vulnerabilities An attacker can use several vulnerabilities of Google Chrome... WordPress SiteMile Project Theme: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress SiteMile Project Theme, in order to run JavaScript code in the context of the web site... Firefox, Thunderbird: multiple vulnerabilities An attacker can use several vulnerabilities of Firefox/Thunderbird... Mozilla NSS: two vulnerabilities An attacker can use several vulnerabilities of Mozilla NSS... Microsoft .NET: bypassing XML signature An attacker can alter an XML document, which is not detected as modified by Microsoft .NET... Windows: four vulnerabilities of Win32k An attacker can use several vulnerabilities of Win32k of Windows... Windows: privilege escalation via USB Mass Storage A local attacker can plug a USB key on Windows, in order to escalate his privileges... Windows: privilege escalation via Secondary Logon Service A local attacker can use Secondary Logon Service of Windows, in order to escalate his privileges... Windows: privilege escalation A local attacker can manipulate Windows memory, in order to escalate his privileges... Windows: two vulnerabilities of OLE An attacker can use several vulnerabilities of OLE of Windows... Microsoft Office: three vulnerabilities An attacker can use several vulnerabilities of Microsoft Office... Windows: two vulnerabilities of PDF An attacker can use several vulnerabilities of PDF of Windows... Windows: two vulnerabilities of Media An attacker can use several vulnerabilities of Media of Windows... Windows: two vulnerabilities of OpenType An attacker can use several vulnerabilities of OpenType of Windows... Windows: privilege escalation via DLL Loading An attacker can invite the victim to open an Office document from a directory containing a malicious wab32res.dll library, in order to execute code with victim's privileges... Microsoft Edge: multiple vulnerabilities An attacker can use several vulnerabilities of Microsoft Edge... Internet Explorer: multiple vulnerabilities An attacker can use several vulnerabilities of Internet Explorer... Adobe Reader/Acrobat: three vulnerabilities An attacker can use several vulnerabilities of Adobe Reader/Acrobat... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1105