History of vulnerabilities analyzed by Vigil@nce: tcpdump: out-of-bounds memory reading via print_prefix An attacker can force a read at an invalid address via print_prefix() of tcpdump, in order to trigger a denial of service, or to obtain sensitive information... Open vSwitch: three vulnerabilities An attacker can use several vulnerabilities of Open vSwitch... SQLite, Chrome: memory corruption via FTS3 Query An attacker can generate a memory corruption via a FTS3 query of SQLite, in order to trigger a denial of service, and possibly to run code... Contao: information disclosure via Back End Users Records View An attacker can bypass access restrictions to data via Back End Users Records View of Contao, in order to obtain sensitive information... Ansible Core: information disclosure via Logged Ssh Retry An attacker can bypass access restrictions to data via Logged Ssh Retry of Ansible Core, in order to obtain sensitive information... QEMU: file reading via usb_mtp_get_object A local attacker can read a file via usb_mtp_get_object() of QEMU, in order to obtain sensitive information on the host system... WordPress Core: multiple vulnerabilities An attacker can use several vulnerabilities of WordPress Core... Chrome: use after free via PDFium An attacker can force the usage of a freed memory area via PDFium of Chrome, in order to trigger a denial of service, and possibly to run code... HAProxy: infinite loop via dns_read_name An attacker can generate an infinite loop via dns_read_name() of HAProxy, in order to trigger a denial of service... WordPress Import users from CSV with meta: Cross Site Scripting An attacker can trigger a Cross Site Scripting of WordPress Import users from CSV with meta, in order to run JavaScript code in the context of the web site... QEMU: memory leak via pvrdma_realize An attacker, inside a guest system, can create a memory leak via pvrdma_realize() of QEMU, in order to trigger a denial of service on the host system... Singularity: privilege escalation via Shared Mount Propagation An attacker can bypass restrictions via Shared Mount Propagation of Singularity, in order to escalate his privileges... Node.js underscore.string: denial of service via Regular Expression An attacker can generate a fatal error via Regular Expression of Node.js underscore.string, in order to trigger a denial of service... FreeRDP: multiple vulnerabilities An attacker can use several vulnerabilities of FreeRDP... F5 BIG-IP: privilege escalation via SNMPv3 Clear Passphrases An attacker can bypass restrictions via SNMPv3 Clear Passphrases of F5 BIG-IP, in order to escalate his privileges... Firefox: multiple vulnerabilities An attacker can use several vulnerabilities of Firefox... Linux kernel: privilege escalation via Userfaultfd Sparse Tmpfs Files Write An attacker can bypass restrictions via Userfaultfd Sparse Tmpfs Files Write of the Linux kernel, in order to escalate his privileges... NetBSD: information disclosure via bozohttpd htpasswd An attacker can bypass access restrictions to data via bozohttpd htpasswd of NetBSD, in order to obtain sensitive information... Microsoft Visual Studio: vulnerabilities of July 2018 An attacker can use several vulnerabilities of Microsoft products... Solaris: privilege escalation via RPC Component An attacker can bypass restrictions via RPC Component of Solaris, in order to escalate his privileges... Microsoft Exchange: privilege escalation via Profile Data Tampering An attacker can bypass restrictions via Profile Data Tampering of Microsoft Exchange, in order to escalate his privileges... Microsoft Visual Studio: privilege escalation via Diagnostics Hub Standard Collector Service An attacker can bypass restrictions via Diagnostics Hub Standard Collector Service of Microsoft Visual Studio, in order to escalate his privileges... Microsoft Windows: vulnerabilities of December 2018 An attacker can use several vulnerabilities of Microsoft products... Microsoft Office: vulnerabilities of December 2018 An attacker can use several vulnerabilities of Microsoft products... Microsoft .NET: vulnerabilities of December 2018 An attacker can use several vulnerabilities of Microsoft products... Microsoft IE/Edge: vulnerabilities of December 2018 An attacker can use several vulnerabilities of Microsoft products... Adobe Acrobat/Reader: multiple vulnerabilities An attacker can use several vulnerabilities of Adobe Acrobat/Reader... SAP: multiples vulnerabilities of December 2018 An attacker can use several vulnerabilities of SAP products... phpMyAdmin: three vulnerabilities An attacker can use several vulnerabilities of phpMyAdmin... TYPO3 Core: eight vulnerabilities An attacker can use several vulnerabilities of TYPO3 Core... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103