History of vulnerabilities analyzed by Vigil@nce: 1 Apport: denial of service via Lock File Creation An attacker can trigger a fatal error via Lock File Creation of Apport, in order to trigger a denial of service... 1 Apport: information disclosure via Container Crash Dumps An attacker can bypass access restrictions to data via Container Crash Dumps of Apport, in order to obtain sensitive information... 1 Apport: information disclosure via Core Dump Creation An attacker can bypass access restrictions to data via Core Dump Creation of Apport, in order to obtain sensitive information... 2 Apport: file reading A local attacker can read a file of Apport, in order to obtain sensitive information... 2 Whoopsie: code execution via Large Crash Report An attacker can use a vulnerability via Large Crash Report of Whoopsie, in order to run code... 2 FortiClient for Mac OS: privilege escalation via Command Injection An attacker can bypass restrictions via Command Injection of FortiClient for Mac OS, in order to escalate his privileges... 3 GNU libidn2: buffer overflow via idn2_to_ascii_4i An attacker can trigger a buffer overflow via idn2_to_ascii_4i() of GNU libidn2, in order to trigger a denial of service, and possibly to run code... 3 GNU libidn2: privilege escalation via A-labels To U-labels Conversion An attacker can bypass restrictions via A-labels To U-labels Conversion of GNU libidn2, in order to escalate his privileges... 2 Samba: three vulnerabilities An attacker can use several vulnerabilities of Samba... 3 Trend Micro OfficeScan: privilege escalation via Root Login Bypass An attacker can bypass restrictions via Root Login Bypass of Trend Micro OfficeScan, in order to escalate his privileges... 3 Trend Micro OfficeScan: directory traversal via ZIP An attacker can traverse directories of Trend Micro OfficeScan, in order to create a file outside the service root path... 2 LZ4: buffer overflow via LZ4_write32 An attacker can trigger a buffer overflow via LZ4_write32() of LZ4, in order to trigger a denial of service, and possibly to run code... 2 Apache Commons Compress: infinite loop via File Name Encoding An attacker can trigger an infinite loop via File Name Encoding of Apache Commons Compress, in order to trigger a denial of service... 2 Xpdf: out-of-bounds memory reading via FoFiType1C-convertToType0 An attacker can force a read at an invalid address via FoFiType1C::convertToType0() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information... 2 Xpdf: out-of-bounds memory reading via FoFiType1C-convertToType1 An attacker can force a read at an invalid address via FoFiType1C::convertToType1() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information... 2 Xpdf: out-of-bounds memory reading via FlateStream-getChar An attacker can force a read at an invalid address via FlateStream::getChar() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information... 2 Xpdf: out-of-bounds memory reading via JBIG2Stream-readTextRegionSeg An attacker can force a read at an invalid address via JBIG2Stream::readTextRegionSeg() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information... 2 Xpdf: out-of-bounds memory reading via FoFiType1-parse An attacker can force a read at an invalid address via FoFiType1::parse() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information... 2 Xpdf: out-of-bounds memory reading via SampledFunction-transform An attacker can force a read at an invalid address via SampledFunction::transform() of Xpdf, in order to trigger a denial of service, or to obtain sensitive information... 3 Xpdf: buffer overflow via DCTStream-decodeImage An attacker can trigger a buffer overflow via DCTStream::decodeImage() of Xpdf, in order to trigger a denial of service, and possibly to run code... 1 mod_auth_openidc: open redirect via Logout Backslashes Url An attacker can deceive the user via Logout Backslashes Url of mod_auth_openidc, in order to redirect him to a malicious site... 3 mod_auth_openidc: privilege escalation via OIDCUnAuthAction Pass An attacker can bypass restrictions via OIDCUnAuthAction Pass of mod_auth_openidc, in order to escalate his privileges... 2 Go: assertion error via dsa.Verify An attacker can force an assertion error via dsa.Verify() of Go, in order to trigger a denial of service... 2 Mosquitto: NULL pointer dereference An attacker can force a NULL pointer to be dereferenced of Mosquitto, in order to trigger a denial of service... 2 libarchive: use after free via archive_read_format_rar_read_data An attacker can force the usage of a freed memory area via archive_read_format_rar_read_data() of libarchive, in order to trigger a denial of service, and possibly to run code... 2 Ignite Openfire: privilege escalation via FaviconServlet.java GET Requests An attacker can bypass restrictions via FaviconServlet.java GET Requests of Ignite Openfire, in order to escalate his privileges... 2 Ignite Openfire: directory traversal via PluginServlet.java An attacker can traverse directories via PluginServlet.java of Ignite Openfire, in order to read a file outside the service root path... 1 TeamViewer: executing DLL code An attacker can create a malicious DLL, and then put it in the current directory of TeamViewer, in order to execute code... 2 VMware ESXi/Workstation: denial of service via Shader An attacker can trigger a fatal error via Shader of VMware ESXi/Workstation, in order to trigger a denial of service... 2 VMware vCenter Server Appliance: information disclosure via File-Based Backup and Restore An attacker can bypass access restrictions to data via File-Based Backup and Restore of VMware vCenter Server Appliance, in order to obtain sensitive information... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 994