History of vulnerabilities analyzed by Vigil@nce: Cisco Data Center Network Manager: multiple vulnerabilities An attacker can use several vulnerabilities of Cisco Data Center Network Manager... Wireshark: three vulnerabilities An attacker can use several vulnerabilities of Wireshark... Moodle: information disclosure via Email Addresses An attacker can bypass access restrictions to data via Email Addresses of Moodle, in order to obtain sensitive information... Apache Struts REST Plugin: denial of service via JSON An attacker can generate a fatal error via JSON of Apache Struts REST Plugin, in order to trigger a denial of service... SoX: use after free via lsx_aiffstartread An attacker can force the usage of a freed memory area via lsx_aiffstartread() of SoX, in order to trigger a denial of service, and possibly to run code... SoX: buffer overflow via lsx_ms_adpcm_block_expand_i An attacker can generate a buffer overflow via lsx_ms_adpcm_block_expand_i() of SoX, in order to trigger a denial of service, and possibly to run code... SoX: assertion error via sox_append_comment An attacker can force an assertion error via sox_append_comment() of SoX, in order to trigger a denial of service... SoX: buffer overflow via ImaExpandS An attacker can generate a buffer overflow via ImaExpandS() of SoX, in order to trigger a denial of service, and possibly to run code... SoX: denial of service via wavwritehdr An attacker can generate a fatal error via wavwritehdr() of SoX, in order to trigger a denial of service... SoX: out-of-bounds memory reading via read_samples An attacker can force a read at an invalid address via read_samples() of SoX, in order to trigger a denial of service, or to obtain sensitive information... SoX: denial of service via startread An attacker can generate a fatal error via startread() of SoX, in order to trigger a denial of service... optipng: buffer overflow via LZWReadByte An attacker can generate a buffer overflow via LZWReadByte() of optipng, in order to trigger a denial of service, and possibly to run code... LibTIFF: buffer overflow via pal2rgb An attacker can generate a buffer overflow via pal2rgb() of LibTIFF, in order to trigger a denial of service, and possibly to run code... WordPress Core: four vulnerabilities An attacker can use several vulnerabilities of WordPress Core... Cisco UCS Central Software: two vulnerabilities An attacker can use several vulnerabilities of Cisco UCS Central Software... Cisco NX-OS: privilege escalation via Bash Shell An attacker can bypass restrictions via Bash Shell of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via Guest Shell An attacker can bypass restrictions via Guest Shell of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via Open Agent Container An attacker can bypass restrictions via Open Agent Container of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via Software Patch Installation An attacker can bypass restrictions via Software Patch Installation of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via CLI Command Injection An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: file reading via CLI A local attacker can read a file via CLI of Cisco NX-OS, in order to obtain sensitive information... Cisco NX-OS: privilege escalation via Interactive TCL Shell Escape An attacker can bypass restrictions via Interactive TCL Shell Escape of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via CLI Command Injection An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via CLI Command Injection An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via Software Image Signature An attacker can bypass restrictions via Software Image Signature of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: directory traversal via Software Patch Installation An attacker can traverse directories via Software Patch Installation of Cisco NX-OS, in order to create a file outside the service root path... Cisco NX-OS: privilege escalation via Software Patch Signature An attacker can bypass restrictions via Software Patch Signature of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via CLI Command Injection An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges... Cisco IP Phone 8800: denial of service via SIP An attacker can send malicious SIP packets to Cisco IP Phone 8800, in order to trigger a denial of service... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103