History of vulnerabilities analyzed by Vigil@nce: QEMU: memory corruption via nvme_cmb_ops An attacker, inside a guest system, can generate a memory corruption via nvme_cmb_ops() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system... Ansible Core: information disclosure via ssh-keygen Command Line An attacker can bypass access restrictions to data via ssh-keygen Command Line of Ansible Core, in order to obtain sensitive information... Intel processors: information disclosure via SMT/Hyper-Threading PortSmash An attacker can bypass access restrictions to data via SMT/Hyper-Threading PortSmash on an Intel processor, in order to obtain sensitive information... QEMU: memory corruption via lsi53c895a-lsi_do_msgin An attacker, inside a guest system, can generate a memory corruption via lsi53c895a::lsi_do_msgin() of QEMU, in order to trigger a denial of service, and possibly to run code on the host system... Apache Tomcat JK mod_jk: information disclosure via Reverse Proxy An attacker can bypass access restrictions to data via Reverse Proxy of Apache Tomcat JK mod_jk, in order to obtain sensitive information... F5 BIG-IP: denial of service via iControl TMSH An attacker can generate a fatal error via iControl TMSH of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: denial of service via VLAN Group Port Lockdown An attacker can generate a fatal error via VLAN Group Port Lockdown of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: denial of service via HTTP Normalize URI An attacker can generate a fatal error via HTTP Normalize URI of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP APM: denial of service via Portal Access An attacker can generate a fatal error via Portal Access of F5 BIG-IP APM, in order to trigger a denial of service... F5 BIG-IP: denial of service via TMM SSL BAD_RECORD_MAC An attacker can generate a fatal error via TMM SSL BAD_RECORD_MAC of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: denial of service via Tmsh Edit Cli Preference An attacker can generate a fatal error via Tmsh Edit Cli Preference of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: denial of service via MQTT An attacker can generate a fatal error via MQTT of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: privilege escalation via Configuration Utility Commands An attacker can bypass restrictions via Configuration Utility Commands of F5 BIG-IP, in order to escalate his privileges... F5 BIG-IP: denial of service via TMM MPTCP HUDCTL_ABORT An attacker can generate a fatal error via TMM MPTCP HUDCTL_ABORT of F5 BIG-IP, in order to trigger a denial of service... F5 BIG-IP: privilege escalation via tmsh An attacker can bypass restrictions via tmsh of F5 BIG-IP, in order to escalate his privileges... F5 BIG-IP APM: privilege escalation via CRLDP Auth Revoked Certificates An attacker can bypass restrictions via CRLDP Auth Revoked Certificates of F5 BIG-IP APM, in order to escalate his privileges... sos-collector: file reading A local attacker can read a file of sos-collector, in order to obtain sensitive information... Apple iOS: multiple vulnerabilities An attacker can use several vulnerabilities of Apple iOS... Apple macOS: multiple vulnerabilities An attacker can use several vulnerabilities of Apple macOS... libcurl: out-of-bounds memory reading via Warning Message An attacker can force a read at an invalid address via Warning Message of libcurl, in order to trigger a denial of service, or to obtain sensitive information... libcurl: use after free via Curl_close An attacker can force the usage of a freed memory area via Curl_close() of libcurl, in order to trigger a denial of service, and possibly to run code... libcurl: buffer overflow via Curl_auth_create_plain_message An attacker can generate a buffer overflow via Curl_auth_create_plain_message() of libcurl, in order to trigger a denial of service, and possibly to run code... libarchive: out-of-bounds memory reading via archive_read_format_rar_read_header An attacker can force a read at an invalid address via archive_read_format_rar_read_header() of libarchive, in order to trigger a denial of service, or to obtain sensitive information... WebSphere AS: code execution via OpenID Connect An attacker can use a vulnerability via OpenID Connect of WebSphere AS, in order to run code... RHEL 7: privilege escalation via setup An attacker can bypass restrictions via setup of RHEL 7, in order to escalate his privileges... LibRaw: NULL pointer dereference via leaf_hdr_load_raw An attacker can force a NULL pointer to be dereferenced via leaf_hdr_load_raw() of LibRaw, in order to trigger a denial of service... LibRaw: memory corruption via quicktake_100_load_raw An attacker can generate a memory corruption via quicktake_100_load_raw() of LibRaw, in order to trigger a denial of service, and possibly to run code... binutils nm: infinite loop An attacker can generate an infinite loop of binutils nm, in order to trigger a denial of service... OpenSSL: information disclosure via DSA Signature Generation An attacker can bypass access restrictions to data via DSA Signature Generation of OpenSSL, in order to obtain sensitive information... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1102