History of vulnerabilities analyzed by Vigil@nce: Wget: buffer overflow via IRI An attacker can trigger a buffer overflow of Wget, in order to trigger a denial of service, and possibly to run code... Python Pallets Project Flask: memory leak via JSON Data An attacker can create a memory leak via JSON Data of Python Pallets Project Flask, in order to trigger a denial of service... Tor: memory leak via KIST Cell Scheduler An attacker can create a memory leak via KIST Cell Scheduler of Tor, in order to trigger a denial of service... Bluez: out-of-bounds memory reading via packet_hexdump An attacker can force a read at an invalid address via packet_hexdump() of Bluez, in order to trigger a denial of service, or to obtain sensitive information... Google Android/Pixel: multiple vulnerabilities of April 2019 An attacker can use several vulnerabilities of Google Android/Pixel... Node.js tesseract.js: information disclosure An attacker can bypass access restrictions to data of Node.js tesseract.js, in order to obtain sensitive information... Cloud Foundry Container Runtime: information disclosure via Container Networking Interface An attacker can bypass access restrictions to data via Container Networking Interface of Cloud Foundry Container Runtime, in order to obtain sensitive information... Fortinet FortiClient Mac: denial of service An attacker can trigger a fatal error of Fortinet FortiClient Mac, in order to trigger a denial of service... Kubernetes: directory traversal via Kubectl Cp An attacker can traverse directories via Kubectl Cp of Kubernetes, in order to read a file outside the service root path... PostgreSQL: code execution via COPY TO/FROM PROGRAM An attacker can use a vulnerability via COPY TO/FROM PROGRAM of PostgreSQL, in order to run code... Apache httpd: information disclosure via URL Normalization Consecutive Slashes An attacker can bypass access restrictions to data via URL Normalization Consecutive Slashes of Apache httpd, in order to obtain sensitive information... Apache httpd mod_auth_digest: privilege escalation via Race Condition An attacker can bypass restrictions via Race Condition of Apache httpd mod_auth_digest, in order to escalate his privileges... Apache httpd mod_ssl: privilege escalation via Per-location Client Certificate An attacker can bypass restrictions via Per-location Client Certificate of Apache httpd mod_ssl, in order to escalate his privileges... Apache httpd: privilege escalation via Scoreboard An attacker can bypass restrictions via Scoreboard of Apache httpd, in order to escalate his privileges... Apache httpd mod_http2: denial of service via H2Upgrade An attacker can trigger a fatal error via mod_http2 H2Upgrade of Apache httpd, in order to trigger a denial of service... Apache httpd mod_http2: denial of service via String Compare An attacker can trigger a fatal error via mod_http2 String Compare of Apache httpd, in order to trigger a denial of service... IBM DB2: buffer overflow An attacker can trigger a buffer overflow of IBM DB2, in order to trigger a denial of service, and possibly to run code... IBM DB2: buffer overflow via libdb2e.so.1 An attacker can trigger a buffer overflow via libdb2e.so.1 of IBM DB2, in order to trigger a denial of service, and possibly to run code... Flatpak: privilege escalation via Seccomp An attacker can bypass restrictions via Seccomp of Flatpak, in order to escalate his privileges... Rails: code execution via Development Mode An attacker can use a vulnerability via Development Mode of Rails, in order to run code... Notepad++: buffer overflow via Command-extractArgs An attacker can trigger a buffer overflow via Command::extractArgs of Notepad++, in order to trigger a denial of service, and possibly to run code... FortiOS: information disclosure via HTTP Headers Parsing An attacker can bypass access restrictions to data via HTTP Headers Parsing of FortiOS, in order to obtain sensitive information... Forcepoint Email Security: privilege escalation via Password Reset Link Expiration An attacker can bypass restrictions via Password Reset Link Expiration of Forcepoint Email Security, in order to escalate his privileges... GPAC: buffer overflow via MP4Box An attacker can trigger a buffer overflow via MP4Box of GPAC, in order to trigger a denial of service, and possibly to run code... sysstat: out-of-bounds memory reading via remap_struct memset An attacker can force a read at an invalid address via remap_struct() memset() of sysstat, in order to trigger a denial of service, or to obtain sensitive information... sysstat: out-of-bounds memory reading via remap_struct memmove An attacker can force a read at an invalid address via remap_struct() memmove() of sysstat, in order to trigger a denial of service, or to obtain sensitive information... Rails: infinite loop via Action View An attacker can trigger an infinite loop via Action View of Rails, in order to trigger a denial of service... Rails: file reading via Action View A local attacker can read a file via Action View of Rails, in order to obtain sensitive information... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 941 961 981 1001 1021 1041 1061 1081 1101 1114