History of vulnerabilities analyzed by Vigil@nce: Apple iOS, macOS: memory corruption An attacker can generate a memory corruption of Apple iOS et macOS, in order to trigger a denial of service, and possibly to run code... FFmpeg: three vulnerabilities An attacker can use several vulnerabilities of FFmpeg... rrdtool: vulnerability A vulnerability of rrdtool was announced... Sophos XG Series: directory traversal An attacker can traverse directories of Sophos XG Series, in order to read a file outside the service root path... Microsoft Edge: privilege escalation by bypassing the ACG feature An attacker can bypass the ACG feature of Microsoft Edge which protects against JavaScript exploits, in order to escalate his privileges... Joomla jGive: SQL injection An attacker can use a SQL injection of Joomla jGive, in order to read or alter data... Joomla MediaLibrary Free: SQL injection An attacker can use a SQL injection of Joomla MediaLibrary Free, in order to read or alter data... ISC BIND: assertion error via DNSSEC An attacker can force an assertion error via DNSSEC of ISC BIND, in order to trigger a denial of service... mupdf: use after free via fz_keep_key_storable An attacker can force the usage of a freed memory area via fz_keep_key_storable() of mupdf, in order to trigger a denial of service, and possibly to run code... GraphicsMagick: two vulnerabilities An attacker can use several vulnerabilities of GraphicsMagick... WordPress UltimateMember: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress UltimateMember, in order to run JavaScript code in the context of the web site... Node.js hoek: denial of service via JSON An attacker can generate a fatal error via JSON of Node.js hoek, in order to trigger a denial of service... irssi: five vulnerabilities An attacker can use several vulnerabilities of irssi... glibc: three vulnerabilities An attacker can use several vulnerabilities of glibc... Quagga: four vulnerabilities via BGP An attacker can use several vulnerabilities via BGP of Quagga... Trend Micro OfficeScan: executing DLL code An attacker can create a malicious DLL, and then put it in the current directory of Trend Micro OfficeScan, in order to execute code... python-crypto: weak key generation An attacker can bypass access restrictions to data of python-crypto, in order to obtain sensitive information... Node ssri: infinite loop via a regular expression An attacker can generate an endless loop in Node ssri via a regular expression, in order to trigger a denial of service... EMC NetWorker vProxy: vulnerability via the embeded Linux kernel A vulnerability of the Linux kernel embeded in EMC NetWorker vProxy was announced... FreeType: denial of service An attacker can generate a fatal error of FreeType, in order to trigger a denial of service... Jenkins Core LTS: three vulnerabilities An attacker can use several vulnerabilities of Jenkins Core LTS... mujs: two vulnerabilities An attacker can use several vulnerabilities of mujs... Drupal Entity API: information disclosure via the debugging output An attacker can read debug output from Drupal Entity API, in order to get sensitive information... Drupal Dynamic Banner: vulnerability A vulnerability of Drupal Dynamic Banner was announced... Drupal Entity Backup: vulnerability A vulnerability of Drupal Entity Backup was announced... Drupal Custom Permissions: privilege escalation An attacker can bypass restrictions of Drupal Custom Permissions, in order to escalate his privileges... Drupal VChess: vulnerability A vulnerability of Drupal VChess was announced... Google Chrome: memory corruption via V8 An attacker can generate a memory corruption via V8 of Google Chrome, in order to trigger a denial of service, and possibly to run code... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1121 1127