The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Oracle Java: vulnerabilities of July 2017
Several vulnerabilities were announced in Oracle Java...
Oracle Communications: vulnerabilities of July 2017
Several vulnerabilities were announced in Oracle Communications...
Oracle Fusion Middleware: vulnerabilities of July 2017
Several vulnerabilities were announced in Oracle Fusion Middleware...
Oracle Database: vulnerabilities of July 2017
Several vulnerabilities were announced in Oracle Database...
QEMU: out-of-bounds memory reading via dhcp_decode
An attacker, inside a guest system, can force a read at an invalid address via dhcp_decode() of QEMU, in order to trigger a denial of service, or to obtain sensitive information on the host system...
ImageMagick: infinite loop via ReadDPXImage
An attacker can generate an infinite loop via ReadDPXImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: infinite loop via ReadRLEImage
An attacker can generate an infinite loop via ReadRLEImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via ReadTGAImage
An attacker can create a memory leak via ReadTGAImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: memory leak via ReadMATImage
An attacker can create a memory leak via ReadMATImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via GetNextToken
An attacker can force a read at an invalid address via GetNextToken() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
ImageMagick: two vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: two vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: three vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
Vim: use after free via Source File
An attacker can force the usage of a freed memory area via Source File of Vim, in order to trigger a denial of service, and possibly to run code...
WebSphere AS: information disclosure via Proxy Server / ODR
An attacker can bypass access restrictions to data via Proxy Server / ODR of WebSphere Application Server, in order to obtain sensitive information...
Symfony: privilege escalation via UserPassword/NotBlank
An attacker can bypass restrictions via UserPassword/NotBlank of Symfony, in order to escalate his privileges...
libmtp: two vulnerabilities
An attacker can use several vulnerabilities of libmtp...
Synology DSM: two vulnerabilities
An attacker can use several vulnerabilities of Synology DSM...
WordPress DSubscribers: SQL injection
An attacker can use a SQL injection of WordPress DSubscribers, in order to read or alter data...
Joomla IJSEO: SQL injection
An attacker can use a SQL injection of Joomla IJSEO, in order to read or alter data...
F5 BIG-IP PEM: Man-in-the-Middle via TAC Database
An attacker can act as a Man-in-the-Middle via TAC Database on F5 BIG-IP PEM, in order to read or write data in the session...
FreeRADIUS: multiple vulnerabilities
An attacker can use several vulnerabilities of FreeRADIUS...
WordPress Relevanssi: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Relevanssi, in order to run JavaScript code in the context of the web site...
WordPress Vospari Forms: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Vospari Forms, in order to run JavaScript code in the context of the web site...
Cacti: multiple vulnerabilities
An attacker can use several vulnerabilities of Cacti...
Oracle GlassFish Server: multiple vulnerabilities
An attacker can use several vulnerabilities of Oracle GlassFish Server...
LibTIFF: buffer overflow via tiff2pdf
An attacker can generate a buffer overflow via tiff2pdf of LibTIFF, in order to trigger a denial of service, and possibly to run code...
cryptctl: directory traversal via RPC Request
An attacker can traverse directories via RPC Request of cryptctl, in order to create a file outside the service root path...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 723 724 725 726 727 728 729 730 731 733 735 736 737 738 739 740 741 742 743 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021