History of vulnerabilities analyzed by Vigil@nce: Oracle Java: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Oracle Outside In Technology: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Oracle Fusion Middleware: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Oracle Berkeley DB: denial of service via Data Store An attacker can trigger a fatal error via Data Store of Oracle Berkeley DB, in order to trigger a denial of service... Oracle Database: vulnerabilities of April 2019 Several vulnerabilities were announced in Oracle products... Cacti: Cross Site Scripting via SNMP Community String An attacker can trigger a Cross Site Scripting via SNMP Community String of Cacti, in order to run JavaScript code in the context of the web site... Python urllib3: information disclosure via CRLF Injection An attacker can bypass access restrictions to data via CRLF Injection of Python urllib3, in order to obtain sensitive information... PC/SC Lite: memory leak via SCardEstablishContextTH An attacker can create a memory leak via SCardEstablishContextTH() of PC/SC Lite, in order to trigger a denial of service... libxslt: read/write via xsltCheckRead/xsltCheckWrite An attacker can bypass access restrictions to data via xsltCheckRead/xsltCheckWrite() of libxslt, in order to obtain sensitive information, or to alter data... libvirt: information disclosure via Guest Agent API An attacker can bypass access restrictions to data via Guest Agent API of libvirt, in order to obtain sensitive information... Node.js simple-markdown: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Node.js simple-markdown, in order to run JavaScript code in the context of the web site... GraphicsMagick: five vulnerabilities An attacker can use several vulnerabilities of GraphicsMagick... HP LaserJet: code execution via Signature Validation Bypass An attacker can use a vulnerability via Signature Validation Bypass of HP LaserJet, in order to run code... Pulse Connect Secure, Pulse Secure Desktop: information disclosure via Session Cookies Reading An attacker can bypass access restrictions to data via Session Cookies Reading of Pulse Connect Secure and Pulse Secure Desktop, in order to obtain sensitive information... VMware ESXi/Workstation: three vulnerabilities An attacker can use several vulnerabilities of VMware ESXi/Workstation... Checkstyle: information disclosure via External DTD An attacker can bypass access restrictions to data via External DTD of Checkstyle, in order to obtain sensitive information... jQuery Core: privilege escalation via Object.prototype Pollution An attacker can bypass restrictions via Object.prototype Pollution of jQuery Core, in order to escalate his privileges... Node.js Modules: multiple vulnerabilities An attacker can use several vulnerabilities of Node.js Modules... Joomla JB Bus: SQL injection An attacker can use a SQL injection of Joomla JB Bus, in order to read or alter data... Joomla Pinterest Clone Social Pinboard: SQL injection An attacker can use a SQL injection of Joomla Pinterest Clone Social Pinboard, in order to read or alter data... FreeRADIUS: privilege escalation via EAP-PWD An attacker can bypass restrictions via EAP-PWD of FreeRADIUS, in order to escalate his privileges... lighttpd: denial of service via url-path-2f-decode An attacker can trigger a fatal error via url-path-2f-decode of lighttpd, in order to trigger a denial of service... Junos OS SRX5000: denial of service via fxp0 Packet An attacker can trigger a fatal error via fxp0 Packet of Junos OS SRX5000, in order to trigger a denial of service... Junos OS: denial of service via RPD SNMP An attacker can send malicious RPD SNMP packets to Junos OS, in order to trigger a denial of service... Junos OS EX4300-MP: information disclosure via Transit Network Traffic Control Plane An attacker can bypass access restrictions to data via Transit Network Traffic Control Plane of Junos OS EX4300-MP, in order to obtain sensitive information... Junos OS: denial of service via BGP Peer Restarts An attacker can trigger a fatal error via BGP Peer Restarts of Junos OS, in order to trigger a denial of service... Junos OS: denial of service via BGP Tracing An attacker can trigger a fatal error via BGP Tracing of Junos OS, in order to trigger a denial of service... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 941 961 981 1001 1021 1041 1061 1081 1101 1103