History of vulnerabilities analyzed by Vigil@nce: FortiOS: information disclosure via fnsysctl An attacker can bypass access restrictions to data via fnsysctl of FortiOS, in order to obtain sensitive information... Node Core: information disclosure via Fill Value Encoding A local attacker can read a memory fragment via Fill Value Encoding of Node Core, in order to obtain sensitive information... Node Core: information disclosure via SSL_read An attacker can bypass access restrictions to data via SSL_read() of Node Core, in order to obtain sensitive information... WordPress Crowd Ideas: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Crowd Ideas, in order to run JavaScript code in the context of the web site... Synology Router Manager: directory traversal An attacker can traverse directories of Synology Router Manager, in order to create a file outside the service root path... Synology DiskStation Manager: directory traversal An attacker can traverse directories of Synology DiskStation Manager, in order to create a file outside the service root path... Synology File Station: directory traversal An attacker can traverse directories of Synology File Station, in order to create a file outside the service root path... Synology Calendar: privilege escalation An attacker can bypass restrictions of Synology Calendar, in order to escalate his privileges... OpenBSD: denial of service via MPLS An attacker can send malicious MPLS packets to OpenBSD, in order to trigger a denial of service... Fedora ARM Installer: privilege escalation via /tmp Mount An attacker can bypass restrictions via /tmp Mount of Fedora ARM Installer, in order to escalate his privileges... Docker Moby: denial of service via gzip decompression An attacker can consume all disk storage via the unlimited decompression of a Gzip file by Docker Moby, in order to trigger a denial of service... WildMidi: four vulnerabilities An attacker can use several vulnerabilities of WildMidi... transfig: memory corruption via fig2dev An attacker can generate a memory corruption via fig2dev of transfig, in order to trigger a denial of service, and possibly to run code... CouchDB: code execution via Remote Configuration Options An attacker can use a vulnerability via Remote Configuration Options of CouchDB, in order to run code... CouchDB: privilege escalation via _users An attacker can bypass restrictions via _users of CouchDB, in order to escalate his privileges... BorgBackup: privilege escalation via Borg SSH An attacker can bypass restrictions via Borg SSH of BorgBackup, in order to escalate his privileges... collectd: use after free via SNMP Plugin An attacker can force the usage of a freed memory area via SNMP Plugin of collectd, in order to trigger a denial of service, and possibly to run code... xrdp: buffer overflow via scp_v0s_accept An attacker can generate a buffer overflow via scp_v0s_accept() of xrdp, in order to trigger a denial of service, and possibly to run code... Open Build Service: privilege escalation via rpmbuild An attacker can bypass restrictions via rpmbuild of Open Build Service, in order to escalate his privileges... Open Build Service: write access via extractbuild An attacker can bypass access restrictions via extractbuild of Open Build Service, in order to alter data... Open Build Service: write access via cpio An attacker can bypass access restrictions via cpio of Open Build Service, in order to alter data... Linux kernel: privilege escalation via bnep_add_connection An attacker can bypass restrictions via bnep_add_connection() of the Linux kernel, in order to escalate his privileges... FortiClient: privilege escalation via VPN Credentials An attacker can bypass restrictions via VPN Credentials of FortiClient, in order to escalate his privileges... WordPress File Manager: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress File Manager, in order to run JavaScript code in the context of the web site... Firefox, Thunderbird: buffer overflow via ANGLE Library Using Direct 3D 9 An attacker can generate a buffer overflow via ANGLE Library Using Direct 3D 9 of Firefox/Thunderbird, in order to trigger a denial of service, and possibly to run code... libsndfile: out-of-bounds memory reading via d2ulaw_array An attacker can force a read at an invalid address via d2ulaw_array() of libsndfile, in order to trigger a denial of service, or to obtain sensitive information... libsndfile: out-of-bounds memory reading via d2alaw_array An attacker can force a read at an invalid address via d2alaw_array() of libsndfile, in order to trigger a denial of service, or to obtain sensitive information... RHEL: privilege escalation via PostgreSQL PGLOG An attacker can bypass restrictions via PostgreSQL PGLOG of RHEL, in order to escalate his privileges... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1114