The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
ImageMagick: NULL pointer dereference via ReadMATImage
An attacker can force a NULL pointer to be dereferenced via ReadMATImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: seven vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: buffer overflow via ReadSFWImage
An attacker can generate a buffer overflow via ReadSFWImage() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
ImageMagick: use after free via DestroyImage
An attacker can force the usage of a freed memory area via DestroyImage() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
ImageMagick: ten vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: memory leak via ReadPICTImage
An attacker can create a memory leak via ReadPICTImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: five vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: infinite loop via ReadPWPImage
An attacker can generate an infinite loop via ReadPWPImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: four vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: nine vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: memory leak via parse8BIMW
An attacker can create a memory leak via parse8BIMW() of ImageMagick, in order to trigger a denial of service...
ImageMagick: denial of service via ReadDCMImage
An attacker can generate a fatal error via ReadDCMImage of ImageMagick, in order to trigger a denial of service...
ImageMagick: six vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: memory leak via ReadMATImage
An attacker can create a memory leak via ReadMATImage of ImageMagick, in order to trigger a denial of service...
ImageMagick: three vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: fifteen vulnerabilities
An attacker can use several vulnerabilities of ImageMagick...
ImageMagick: infinite loop via ReadOneJNGImage
An attacker can generate an infinite loop via ReadOneJNGImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: infinite loop via ReadPESImage
An attacker can generate an infinite loop via ReadPESImage() of ImageMagick, in order to trigger a denial of service...
ImageMagick: out-of-bounds memory reading via mng_get_long
An attacker can force a read at an invalid address via mng_get_long() of ImageMagick, in order to trigger a denial of service, or to obtain sensitive information...
Joomla StreetGuessr: SQL injection
An attacker can use a SQL injection of Joomla StreetGuessr, in order to read or alter data...
Joomla SP Movie Database: SQL injection
An attacker can use a SQL injection of Joomla SP Movie Database, in order to read or alter data...
Joomla KissGallery: SQL injection
An attacker can use a SQL injection of Joomla KissGallery, in order to read or alter data...
Joomla Quiz Deluxe: SQL injection
An attacker can use a SQL injection of Joomla Quiz Deluxe, in order to read or alter data...
Joomla Joomanager: directory traversal
An attacker can traverse directories of Joomla Joomanager, in order to read a file outside the service root path...
LibTIFF: assertion error via TIFFWriteDirectoryTagSubifd
An attacker can force an assertion error via TIFFWriteDirectoryTagSubifd() of LibTIFF, in order to trigger a denial of service...
LibTIFF: assertion error via TIFFWriteDirectorySec
An attacker can force an assertion error via TIFFWriteDirectorySec() of LibTIFF, in order to trigger a denial of service...
SQLite: NULL pointer dereference via dump_callback
An attacker can force a NULL pointer to be dereferenced via dump_callback() of SQLite, in order to trigger a denial of service...
Siemens SIMATIC: information disclosure via Discovery Service
An attacker can bypass access restrictions to data via Discovery Service of Siemens SIMATIC, in order to obtain sensitive information...
MongoDB: vulnerability
A vulnerability of MongoDB was announced...
PyJWT: denial of service
An attacker can generate a fatal error of PyJWT, in order to trigger a denial of service...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 736 737 738 739 740 741 742 743 744 746 748 749 750 751 752 753 754 755 756 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1058