History of vulnerabilities analyzed by Vigil@nce: IBM DB2: buffer overflow via db2exmig/db2exfmt An attacker can generate a buffer overflow via db2exmig/db2exfmt of IBM DB2, in order to trigger a denial of service, and possibly to run code... Python: denial of service via I/O Stream Concurrence An attacker can generate a fatal error via I/O Stream Concurrence of Python, in order to trigger a denial of service... procps: multiple vulnerabilities An attacker can use several vulnerabilities of procps... Joomla Core: multiple vulnerabilities An attacker can use several vulnerabilities of Joomla Core... FortiOS: privilege escalation via USB Storage Device An attacker can bypass restrictions via USB Storage Device of FortiOS, in order to escalate his privileges... FortiOS: information disclosure via Crafted URLs An attacker can bypass access restrictions to data via Crafted URLs of FortiOS, in order to obtain sensitive information... OpenStack Cinder: information disclosure via ScaleIO Volumes An attacker can bypass access restrictions to data via ScaleIO Volumes of OpenStack Cinder, in order to obtain sensitive information... OpenJPEG2: buffer overflow via pgxtovolume An attacker can generate a buffer overflow via pgxtovolume() of OpenJPEG2, in order to trigger a denial of service, and possibly to run code... OpenJPEG2: buffer overflow via pgxtoimage An attacker can generate a buffer overflow via pgxtoimage() of OpenJPEG2, in order to trigger a denial of service, and possibly to run code... OpenJPEG2: use after free via j2k_read_ppm_v3 An attacker can force the usage of a freed memory area via j2k_read_ppm_v3() of OpenJPEG2, in order to trigger a denial of service, and possibly to run code... VMWare Workstation: NULL pointer dereference via RPC Handler An attacker can force a NULL pointer to be dereferenced via RPC Handler of VMWare Workstation, in order to trigger a denial of service... Joomla EkRishta: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Joomla EkRishta, in order to run JavaScript code in the context of the web site... Linux kernel: denial of service via etm_setup_aux An attacker can generate a fatal error via etm_setup_aux() of the Linux kernel, in order to trigger a denial of service... Linux kernel: denial of service via Session Keyrings Creation An attacker can generate a fatal error via Session Keyrings Creation of the Linux kernel, in order to trigger a denial of service... Processors: information disclosure via System Register A local attacker can read a memory fragment via System Register of some processors, in order to obtain sensitive information... Processors: information disclosure via Speculative Store A local attacker can read a memory fragment via Speculative Store of some processors, in order to obtain sensitive information... Linux kernel: privilege escalation via proc_pid_cmdline_read and environ_read An attacker can bypass restrictions via proc_pid_cmdline_read() and environ_read() of the Linux kernel, in order to escalate his privileges... ISC BIND: assertion error via serve-stale An attacker can force an assertion error via serve-stale of ISC BIND, in order to trigger a denial of service... ISC BIND: denial of service via Zone Transfer Succession An attacker can generate a fatal error via Zone Transfer Succession of ISC BIND, in order to trigger a denial of service... glibc: buffer overflow via realpath An attacker can generate a buffer overflow via realpath() of glibc, in order to trigger a denial of service, and possibly to run code... Exiv2: infinite loop via Exiv2-Image-printIFDStructure An attacker can generate an infinite loop via Exiv2::Image::printIFDStructure() of Exiv2, in order to trigger a denial of service... Exiv2: out-of-bounds memory reading via Exiv2-getULong An attacker can force a read at an invalid address via Exiv2::getULong() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information... Exiv2: out-of-bounds memory reading via Exiv2-Image-byteSwap4 An attacker can force a read at an invalid address via Exiv2::Image::byteSwap4() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information... Gitlab: privilege escalation via Auth0 An attacker can bypass restrictions via Auth0 of Gitlab, in order to escalate his privileges... Gitlab: information disclosure via Private Project Names An attacker can bypass access restrictions to data via Private Project Names of Gitlab, in order to obtain sensitive information... ImageMagick: out-of-bounds memory reading via ReadSIXELImage An attacker can force a read at an invalid address via ReadSIXELImage() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information... Apache ZooKeeper: privilege escalation via Quorum Cluster Join An attacker can bypass restrictions via Quorum Cluster Join of Apache ZooKeeper, in order to escalate his privileges... lilypond: code execution via BROWSER Environment Variable An attacker can use a vulnerability via BROWSER Environment Variable of lilypond, in order to run code... Thunderbird: multiple vulnerabilities An attacker can use several vulnerabilities of Thunderbird... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102