History of vulnerabilities analyzed by Vigil@nce: WebSphere AS: memory leak via Request Headers An attacker can create a memory leak via Request Headers of WebSphere AS, in order to trigger a denial of service... libzip: information disclosure via File Permissions Change An attacker can bypass access restrictions to data via File Permissions Change of libzip, in order to obtain sensitive information... tcpflow: out-of-bounds memory reading via setbit An attacker can force a read at an invalid address via setbit() of tcpflow, in order to trigger a denial of service, or to obtain sensitive information... Vixie Cron: use after free via force_rescan_user An attacker can force the usage of a freed memory area via force_rescan_user() of Vixie Cron, in order to trigger a denial of service, and possibly to run code... Vixie Cron: denial of service via Unlimited Crontab File An attacker can trigger a fatal error via Unlimited Crontab File of Vixie Cron, in order to trigger a denial of service... Vixie Cron: denial of service via Large Crontab File An attacker can trigger a fatal error via Large Crontab File of Vixie Cron, in order to trigger a denial of service... Debian cron: privilege escalation via Postinst Script An attacker can bypass restrictions via Postinst Script of Debian cron, in order to escalate his privileges... OpenBSD: privilege escalation via Allowed ICMP Packets An attacker can bypass restrictions via Allowed ICMP Packets of OpenBSD, in order to escalate his privileges... PyYAML: code execution via yaml.load An attacker can use a vulnerability via yaml.load() of PyYAML, in order to run code... McAfee Network Security Manager: privilege escalation via Expired GUI Sessions An attacker can bypass restrictions via Expired GUI Sessions of McAfee Network Security Manager, in order to escalate his privileges... McAfee Network Security Manager: information disclosure via Manager Disaster Recovery Passwords An attacker can bypass access restrictions to data via Manager Disaster Recovery Passwords of McAfee Network Security Manager, in order to obtain sensitive information... McAfee Network Security Manager: Cross Site Scripting via JQuery An attacker can trigger a Cross Site Scripting via JQuery of McAfee Network Security Manager, in order to run JavaScript code in the context of the web site... Cisco IP Phone 8800: directory traversal via SIP Web Management Interface File Upload An attacker can traverse directories via SIP Web Management Interface File Upload of Cisco IP Phone 8800, in order to write a file outside the service root path... Cisco IP Phone 8800: denial of service via SIP Web Management Interface File Upload An attacker can trigger a fatal error via SIP Web Management Interface File Upload of Cisco IP Phone 8800, in order to trigger a denial of service... Cisco IP Phone 7800/8800: privilege escalation via SIP Web Management Interface Crafted Credentials An attacker can bypass restrictions via SIP Web Management Interface Crafted Credentials of Cisco IP Phone 7800/8800, in order to escalate his privileges... Cisco IP Phone 8800: Cross Site Request Forgery An attacker can trigger a Cross Site Request Forgery of Cisco IP Phone 8800, in order to force the victim to perform operations... Cisco IP Phone 8800: privilege escalation via SIP Web Management Interface Crafted URL An attacker can bypass restrictions via SIP Web Management Interface Crafted URL of Cisco IP Phone 8800, in order to escalate his privileges... GdkPixBuf: memory corruption via File Folder An attacker can trigger a memory corruption via File Folder of GdkPixBuf, in order to trigger a denial of service, and possibly to run code... IBM API Connect: information disclosure via Login Ids An attacker can bypass access restrictions to data via Login Ids of IBM API Connect, in order to obtain sensitive information... Drupal Back To Top: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal Back To Top, in order to run JavaScript code in the context of the web site... Drupal AddToAny Share Buttons: Cross Site Scripting An attacker can trigger a Cross Site Scripting of Drupal AddToAny Share Buttons, in order to run JavaScript code in the context of the web site... Drupal Core: Cross Site Scripting via File Module/Subsystem An attacker can trigger a Cross Site Scripting via File Module/Subsystem of Drupal Core, in order to run JavaScript code in the context of the web site... Alcatel-Lucent OmniPCX Enterprise: privilege escalation via WBM Default Authentication An attacker can bypass restrictions via WBM Default Authentication of Alcatel-Lucent OmniPCX Enterprise, in order to escalate his privileges... Cisco NX-OS: privilege escalation via Software Image Signature Verification An attacker can bypass restrictions via Software Image Signature Verification of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: privilege escalation via Filesystem Access An attacker can bypass restrictions via Filesystem Access of Cisco NX-OS, in order to escalate his privileges... Cisco NX-OS: buffer overflow via Fabric Services An attacker can trigger a buffer overflow via Fabric Services of Cisco NX-OS, in order to trigger a denial of service, and possibly to run code... Cisco NX-OS: privilege escalation via CLI Command Injection An attacker can bypass restrictions via CLI Command Injection of Cisco NX-OS, in order to escalate his privileges... Previous page Next pageDirect access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 941 961 981 1001 1021 1041 1061 1081 1101 1105