History of vulnerabilities analyzed by Vigil@nce: Undertow: information disclosure via ByteBuffer Flushing An attacker can bypass access restrictions to data via ByteBuffer Flushing of Undertow, in order to obtain sensitive information... WildFly: Cross Site Scripting via JBoss Management Console An attacker can trigger a Cross Site Scripting via JBoss Management Console of WildFly, in order to run JavaScript code in the context of the web site... systemd: buffer overflow via D-Bus Message An attacker can trigger a buffer overflow via D-Bus Message of systemd, in order to trigger a denial of service, and possibly to run code... Bluetooth Firmware: information disclosure via Weak Elliptic Curve Parameters An attacker can bypass access restrictions to data via Weak Elliptic Curve Parameters of Bluetooth Firmware, in order to obtain sensitive information... gSOAP: denial of service via WITH_COOKIES An attacker can trigger a fatal error via WITH_COOKIES of gSOAP, in order to trigger a denial of service... Node.js braces: denial of service via Regular Expression An attacker can trigger a fatal error via Regular Expression of Node.js braces, in order to trigger a denial of service... Node.js clean-css: denial of service via Regular Expression An attacker can trigger a fatal error via Regular Expression of Node.js clean-css, in order to trigger a denial of service... PSPP: buffer overflow via read_bytes_internal An attacker can trigger a buffer overflow via read_bytes_internal() of PSPP, in order to trigger a denial of service, and possibly to run code... QEMU: out-of-bounds memory reading via i2c_ddc_rx An attacker can force a read at an invalid address via i2c_ddc_rx() of QEMU, in order to trigger a denial of service, or to obtain sensitive information... Elfutils: two vulnerabilities An attacker can use several vulnerabilities of Elfutils... Elfutils: four vulnerabilities An attacker can use several vulnerabilities of Elfutils... Python Markdown: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Python Markdown, in order to run JavaScript code in the context of the web site... PoDoFo: denial of service via crop_page An attacker can trigger a fatal error via crop_page() of PoDoFo, in order to trigger a denial of service... KDE KAuth: privilege escalation An attacker can bypass restrictions of KDE KAuth, in order to escalate his privileges... GSI OpenSSH: privilege escalation via PermitPAMUserChange An attacker can bypass restrictions via PermitPAMUserChange of GSI OpenSSH, in order to escalate his privileges... Thunderbird: information disclosure via S/MIME Signature Spoofing An attacker can bypass access restrictions to data via S/MIME Signature Spoofing of Thunderbird, in order to obtain sensitive information... libexif: infinite loop via XIF_IFD_INTEROPERABILITY An attacker can trigger an infinite loop via XIF_IFD_INTEROPERABILITY of libexif, in order to trigger a denial of service... Node.js node-os-utils: code execution An attacker can use a vulnerability of Node.js node-os-utils, in order to run code... Node.js url-relative: denial of service An attacker can trigger a fatal error of Node.js url-relative, in order to trigger a denial of service... Node.js lodash: privilege escalation via Prototype Pollution An attacker can bypass restrictions via Prototype Pollution of Node.js lodash, in order to escalate his privileges... Microsoft Visual Studio: vulnerabilities of February 2019 An attacker can use several vulnerabilities of Microsoft products... Skia: buffer overflow via Canvas 2D An attacker can trigger a buffer overflow via Canvas 2D of Skia, in order to trigger a denial of service, and possibly to run code... Drupal Entity Registration: privilege escalation An attacker can bypass restrictions of Drupal Entity Registration, in order to escalate his privileges... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 921 941 961 981 1001 1021 1041 1061 1081 1101 1116