History of vulnerabilities analyzed by Vigil@nce: Drupal OAuth 2.0 Client Login: privilege escalation An attacker can bypass restrictions of Drupal OAuth 2.0 Client Login, in order to escalate his privileges... Drupal Focal Point: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal Focal Point, in order to run JavaScript code in the context of the web site... Sonatype Nexus Repository Manager: code execution via Java Code An attacker can use a vulnerability via Java Code of Sonatype Nexus Repository Manager, in order to run code... Django: memory corruption via django.utils.numberformat.format An attacker can trigger a memory corruption via django.utils.numberformat.format() of Django, in order to trigger a denial of service, and possibly to run code... WebKitGTK+: multiple vulnerabilities An attacker can use several vulnerabilities of WebKitGTK+... Python Slixmpp: privilege escalation via XEP-0223 Plugin An attacker can bypass restrictions via XEP-0223 Plugin of Python Slixmpp, in order to escalate his privileges... Firefox: information disclosure via ImageBitmapRenderingContext An attacker can bypass access restrictions to data via ImageBitmapRenderingContext of Firefox, in order to obtain sensitive information... Skia: integer overflow via Transform Operations An attacker can trigger an integer overflow via Transform Operations of Skia, in order to trigger a denial of service, and possibly to run code... Skia: use after free via Path Creation An attacker can force the usage of a freed memory area via Path Creation of Skia, in order to trigger a denial of service, and possibly to run code... CA Privileged Access Manager: privilege escalation via jk-manager/jk-status An attacker can bypass restrictions via jk-manager/jk-status of CA Privileged Access Manager, in order to escalate his privileges... Joomla Core: multiple vulnerabilities An attacker can use several vulnerabilities of Joomla Core... GVfs: information disclosure An attacker can bypass access restrictions to data of GVfs, in order to obtain sensitive information... snapd: privilege escalation via Socket Access Control An attacker can bypass restrictions via Socket Access Control of snapd, in order to escalate his privileges... Python Numpy: code execution via allow_pickle An attacker can use a vulnerability via allow_pickle of Python Numpy, in order to run code... Linux kernel: information disclosure via kvm_read_guest_virt A local attacker can read a memory fragment via kvm_read_guest_virt() of the Linux kernel, in order to obtain sensitive information... Linux kernel: privilege escalation via kvm_ioctl_create_device An attacker can bypass restrictions via kvm_ioctl_create_device() of the Linux kernel, in order to escalate his privileges... Linux kernel: privilege escalation via KVM Preemption Timer An attacker can bypass restrictions via KVM Preemption Timer of the Linux kernel, in order to escalate his privileges... IBM Rational ClearCase: privilege escalation via GIT Connector Password An attacker can bypass restrictions via GIT Connector Password of IBM Rational ClearCase, in order to escalate his privileges... Flatpak: privilege escalation via apply_extra An attacker can bypass restrictions via apply_extra of Flatpak, in order to escalate his privileges... Windows: vulnerabilities of February 2019 An attacker can use several vulnerabilities of Microsoft products... Microsoft Skype for Business Server: information disclosure via Spoofing An attacker can bypass access restrictions to data via Spoofing of Microsoft Skype for Business Server, in order to obtain sensitive information... Microsoft Office: vulnerabilities of February 2019 An attacker can use several vulnerabilities of Microsoft products... Microsoft Exchange: vulnerabilities of February 2019 An attacker can use several vulnerabilities of Microsoft products... Microsoft .NET: vulnerabilities of February 2019 An attacker can use several vulnerabilities of Microsoft products... Microsoft IE/Edge: vulnerabilities of February 2019 An attacker can use several vulnerabilities of Microsoft products... Adobe Acrobat/Reader: multiple vulnerabilities An attacker can use several vulnerabilities of Adobe Acrobat/Reader... Adobe Flash Player: out-of-bounds memory reading An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information... Python urllib3: information disclosure via TLS Certificate Validation An attacker can bypass access restrictions to data via TLS Certificate Validation of Python urllib3, in order to obtain sensitive information... Avast Antivirus: information disclosure via Process Memory An attacker can bypass access restrictions to data via Process Memory of Avast Antivirus, in order to obtain sensitive information... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 921 941 961 981 1001 1021 1041 1061 1081 1101 1114