History of vulnerabilities analyzed by Vigil@nce: 2 Composer: vulnerability A vulnerability of Composer was announced... 2 Anki: write access via Apkg Imports An attacker can bypass access restrictions via Apkg Imports of Anki, in order to alter data... 3 OpenSLP: memory corruption via slpd_process.c An attacker can generate a memory corruption via slpd_process.c of OpenSLP, in order to trigger a denial of service, and possibly to run code... 3 Ghostscript: integer overflow via set_text_distance An attacker can generate an integer overflow via set_text_distance() of Ghostscript, in order to trigger a denial of service, and possibly to run code... 4 Drupal Core: code execution via Multiple Subsystems An attacker can use a vulnerability via Multiple Subsystems of Drupal Core, in order to run code... 2 EMC VNX/Unisphere: external XML entity injection An attacker can transmit malicious XML data to EMC VNX/Unisphere, in order to read a file, scan sites, or trigger a denial of service... 2 WordPress UK Cookie Consent: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress UK Cookie Consent, in order to run JavaScript code in the context of the web site... 2 Xen: denial of service via XPTI An attacker, inside a guest system, can generate a fatal error via XPTI of Xen, in order to trigger a denial of service on the host system... 2 Xen: file reading via CDROM A local attacker can read a file via CDROM of Xen, in order to obtain sensitive information... 1 Linux kernel: NULL pointer dereference via xfs_bmap_extents_to_btree An attacker can force a NULL pointer to be dereferenced via xfs_bmap_extents_to_btree() of the Linux kernel, in order to trigger a denial of service... 1 Linux kernel: NULL pointer dereference via xfs_dinode_verify An attacker can force a NULL pointer to be dereferenced via xfs_dinode_verify() of the Linux kernel, in order to trigger a denial of service... 1 Linux kernel: NULL pointer dereference via OOM Kill An attacker can force a NULL pointer to be dereferenced via OOM Kill of the Linux kernel, in order to trigger a denial of service... 2 Apache ActiveMQ: denial of service via Openwire Connection Request An attacker can generate a fatal error via Openwire Connection Request of Apache ActiveMQ, in order to trigger a denial of service... 2 OpenID4Java: read-write access via Attribute Exchange An attacker can bypass access restrictions via Attribute Exchange of OpenID4Java, in order to read or alter data... 2 Netty: infinite loop via OpenSslEngine An attacker can generate an infinite loop via OpenSslEngine of Netty, in order to trigger a denial of service... 2 Netty: denial of service via WebSocket08FrameDecoder An attacker can generate a fatal error via WebSocket08FrameDecoder of Netty, in order to trigger a denial of service... 2 IBM QRadar SIEM: Cross Site Scripting An attacker can trigger a Cross Site Scripting of IBM QRadar SIEM, in order to run JavaScript code in the context of the web site... 2 IBM QRadar SIEM: directory traversal An attacker can traverse directories of IBM QRadar SIEM, in order to read a file outside the service root path... 2 IBM QRadar SIEM: SQL injection An attacker can use a SQL injection of IBM QRadar SIEM, in order to read or alter data... 3 IBM QRadar SIEM: code execution via Eval An attacker can use a vulnerability via Eval of IBM QRadar SIEM, in order to run code... 3 IBM QRadar SIEM: code execution via Command Injection An attacker can use a vulnerability via Command Injection of IBM QRadar SIEM, in order to run code... 2 Psensor: directory traversal via create_response An attacker can traverse directories via create_response() of Psensor, in order to read a file outside the service root path... 2 Apache Solr: external XML entity injection An attacker can transmit malicious XML data to Apache Solr, in order to read a file, scan sites, or trigger a denial of service... 2 Apple macOS: two vulnerabilities An attacker can use several vulnerabilities of Apple macOS... 3 Apple iOS: two vulnerabilities An attacker can use several vulnerabilities of Apple iOS... 2 Linux kernel: integer overflow via udl_fb_mmap An attacker can generate an integer overflow via udl_fb_mmap() of the Linux kernel, in order to trigger a denial of service, and possibly to run code... 2 WordPress Responsive Cookie Consent: multiple vulnerabilities An attacker can use several vulnerabilities of WordPress Responsive Cookie Consent... 2 WordPress WD Instagram Feed: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress WD Instagram Feed, in order to run JavaScript code in the context of the web site... 2 WordPress Ultimate Member: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Ultimate Member, in order to run JavaScript code in the context of the web site... 2 WordPress Ultimate Member: Cross Site Request Forgery An attacker can trigger a Cross Site Request Forgery of WordPress Ultimate Member, in order to force the victim to perform operations... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 841 861 881 901 921 941 961 981 996