The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Data Center Network Manager: multiple vulnerabilities
An attacker can use several vulnerabilities of Cisco Data Center Network Manager...
Wireshark: three vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
Moodle: information disclosure via Email Addresses
An attacker can bypass access restrictions to data via Email Addresses of Moodle, in order to obtain sensitive information...
Apache Struts REST Plugin: denial of service via JSON
An attacker can generate a fatal error via JSON of Apache Struts REST Plugin, in order to trigger a denial of service...
SoX: use after free via lsx_aiffstartread
An attacker can force the usage of a freed memory area via lsx_aiffstartread() of SoX, in order to trigger a denial of service, and possibly to run code...
SoX: buffer overflow via lsx_ms_adpcm_block_expand_i
An attacker can generate a buffer overflow via lsx_ms_adpcm_block_expand_i() of SoX, in order to trigger a denial of service, and possibly to run code...
SoX: assertion error via sox_append_comment
An attacker can force an assertion error via sox_append_comment() of SoX, in order to trigger a denial of service...
SoX: buffer overflow via ImaExpandS
An attacker can generate a buffer overflow via ImaExpandS() of SoX, in order to trigger a denial of service, and possibly to run code...
SoX: denial of service via wavwritehdr
An attacker can generate a fatal error via wavwritehdr() of SoX, in order to trigger a denial of service...
SoX: out-of-bounds memory reading via read_samples
An attacker can force a read at an invalid address via read_samples() of SoX, in order to trigger a denial of service, or to obtain sensitive information...
SoX: denial of service via startread
An attacker can generate a fatal error via startread() of SoX, in order to trigger a denial of service...
optipng: buffer overflow via LZWReadByte
An attacker can generate a buffer overflow via LZWReadByte() of optipng, in order to trigger a denial of service, and possibly to run code...
LibTIFF: buffer overflow via pal2rgb
An attacker can generate a buffer overflow via pal2rgb() of LibTIFF, in order to trigger a denial of service, and possibly to run code...
WordPress Core: four vulnerabilities
An attacker can use several vulnerabilities of WordPress Core...
Cisco UCS Central Software: two vulnerabilities
An attacker can use several vulnerabilities of Cisco UCS Central Software...
Cisco NX-OS: privilege escalation via Bash Shell
An attacker can bypass restrictions via Bash Shell of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via Guest Shell
An attacker can bypass restrictions via Guest Shell of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via Open Agent Container
An attacker can bypass restrictions via Open Agent Container of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via Software Patch Installation
An attacker can bypass restrictions via Software Patch Installation of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: file reading via CLI
A local attacker can read a file via CLI of Cisco NX-OS, in order to obtain sensitive information...
Cisco NX-OS: privilege escalation via Interactive TCL Shell Escape
An attacker can bypass restrictions via Interactive TCL Shell Escape of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via Software Image Signature
An attacker can bypass restrictions via Software Image Signature of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: directory traversal via Software Patch Installation
An attacker can traverse directories via Software Patch Installation of Cisco NX-OS, in order to create a file outside the service root path...
Cisco NX-OS: privilege escalation via Software Patch Signature
An attacker can bypass restrictions via Software Patch Signature of Cisco NX-OS, in order to escalate his privileges...
Cisco NX-OS: privilege escalation via CLI Command Injection
An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges...
Cisco IP Phone 8800: denial of service via SIP
An attacker can send malicious SIP packets to Cisco IP Phone 8800, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 767 768 769 770 771 772 773 774 775 777 779 780 781 782 783 784 785 786 787 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103