History of vulnerabilities analyzed by Vigil@nce: Cisco Nexus 9000: privilege escalation via ACI Mode Shell Escape An attacker can bypass restrictions via ACI Mode Shell Escape of Cisco Nexus 9000, in order to escalate his privileges... Firefox/Thunderbird: multiple vulnerabilities An attacker can use several vulnerabilities of Firefox/Thunderbird... Veritas NetBackup Appliance: privilege escalation via Password Disclosure An attacker can bypass restrictions via Password Disclosure of Veritas NetBackup Appliance, in order to escalate his privileges... Mitel MiVoice 6800/6900: Man-in-the-Middle An attacker can act as a Man-in-the-Middle on Mitel MiVoice 6800/6900, in order to read or write data in the session... Synology DSM Calendar: code execution An attacker can use a vulnerability of Synology DSM Calendar, in order to run code... Linux kernel: memory leak via inotify_update_existing_watch An attacker can create a memory leak via inotify_update_existing_watch() of the Linux kernel, in order to trigger a denial of service... WordPress Booking Calendar: SQL injection An attacker can use a SQL injection of WordPress Booking Calendar, in order to read or alter data... WordPress Social Network Tabs: information disclosure An attacker can bypass access restrictions to data of WordPress Social Network Tabs, in order to obtain sensitive information... Openwsman: infinite loop via process_connection An attacker can trigger an infinite loop via process_connection() of Openwsman, in order to trigger a denial of service... Openwsman: file reading via Working Directory Full Access A local attacker can read a file via Working Directory Full Access of Openwsman, in order to obtain sensitive information... SUSE: privilege escalation via YaST RMT Cheetah CLI Password An attacker can bypass restrictions via YaST RMT Cheetah CLI Password of SUSE, in order to escalate his privileges... libssh2: multiple vulnerabilities An attacker can use several vulnerabilities of libssh2... Python: information disclosure via Cookie Domain Check An attacker can bypass access restrictions to data via Cookie Domain Check of Python, in order to obtain sensitive information... cloud-init: privilege escalation via Azure Extra Authorized Keys An attacker can bypass restrictions via Azure Extra Authorized Keys of cloud-init, in order to escalate his privileges... libjpeg-turbo: out-of-bounds memory reading via get_8bit_row An attacker can force a read at an invalid address via get_8bit_row() of libjpeg-turbo, in order to trigger a denial of service, or to obtain sensitive information... SQLALchemy: SQL injection via group_by An attacker can use a SQL injection via group_by of SQLALchemy, in order to read or alter data... SQLALchemy: SQL injection via order_by An attacker can use a SQL injection via order_by of SQLALchemy, in order to read or alter data... PuTTY: five vulnerabilities An attacker can use several vulnerabilities of PuTTY... TeamPass: privilege escalation via Delete Permission An attacker can bypass restrictions via Delete Permission of TeamPass, in order to escalate his privileges... Joomla JEvents: multiple vulnerabilities An attacker can use several vulnerabilities of Joomla JEvents... Linux kernel: assertion error via xfs_aops.c An attacker can force an assertion error via xfs_aops.c of the Linux kernel, in order to trigger a denial of service... QEMU: information disclosure via SLiRP tcp_emu A local attacker, inside a guest system, can read a memory fragment via SLiRP tcp_emu() of QEMU, in order to obtain sensitive information on the host system... LIVE555 Streaming Media Library: out-of-bounds memory reading via parseAuthorizationHeader An attacker can force a read at an invalid address via parseAuthorizationHeader() of LIVE555 Streaming Media Library, in order to trigger a denial of service, or to obtain sensitive information... Debian python-rdflib-tools: code execution via Local Python Modules An attacker can use a vulnerability via Local Python Modules of Debian python-rdflib-tools, in order to run code... VMware Workstation: two vulnerabilities via VMX Process An attacker can use several vulnerabilities via VMX Process of VMware Workstation... libvirt: denial of service via Agent Events Waiting An attacker, inside a guest system, can trigger a fatal error via Agent Events Waiting of libvirt, in order to trigger a denial of service on the host system... IBM MQ: Cross Site Scripting via Console An attacker can trigger a Cross Site Scripting via Console of IBM MQ, in order to run JavaScript code in the context of the web site... Drupal Simple Hierarchical Select: Cross Site Request Forgery An attacker can trigger a Cross Site Request Forgery of Drupal Simple Hierarchical Select, in order to force the victim to perform operations... Drupal Video: code execution An attacker can use a vulnerability of Drupal Video, in order to run code... Drupal Views: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal Views, in order to run JavaScript code in the context of the web site... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 941 961 981 1001 1021 1041 1061 1081 1101 1116