The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Synology Photo Station: multiple vulnerabilities
An attacker can use several vulnerabilities of Synology Photo Station...
WordPress Admin Menu Tree Page View: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Admin Menu Tree Page View, in order to force the victim to perform operations...
WordPress Tab Responsive: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Tab Responsive, in order to run JavaScript code in the context of the web site...
WordPress Easy Custom Auto Excerpt: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Easy Custom Auto Excerpt, in order to run JavaScript code in the context of the web site...
WordPress Media from FTP: directory traversal
An attacker can traverse directories of WordPress Media from FTP, in order to read a file outside the service root path...
ProxySG: four vulnerabilities
An attacker can use several vulnerabilities of ProxySG...
WordPress Download Manager: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress Download Manager, in order to force the victim to perform operations...
Microsoft Office: vulnerabilities of January 2018
An attacker can use several vulnerabilities of Microsoft products...
Microsoft .NET: vulnerabilities of January 2018
An attacker can use several vulnerabilities of Microsoft products...
MuPDF: buffer overflow via pdf_xref_len
An attacker can generate a buffer overflow via pdf_xref_len() of MuPDF, in order to trigger a denial of service, and possibly to run code...
plexus-utils: code execution via Commandline Class
An attacker can use a vulnerability via Commandline Class of plexus-utils, in order to run code...
Adobe Flash Player: out-of-bounds memory reading
An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information...
libvorbis: out-of-bounds memory reading via mapping0_forward
An attacker can force a read at an invalid address via mapping0_forward() of libvorbis, in order to trigger a denial of service, or to obtain sensitive information...
libvorbis: use after free via vorbis_analysis_headerout
An attacker can force the usage of a freed memory area via vorbis_analysis_headerout() of libvorbis, in order to trigger a denial of service, and possibly to run code...
Redmine: code execution via Mercurial Adapter
An attacker can use a vulnerability via Mercurial Adapter of Redmine, in order to run code...
SAP: multiples vulnerabilities of January 2018
An attacker can use several vulnerabilities of SAP products...
WordPress GD Rating System: multiple vulnerabilities
An attacker can use several vulnerabilities of WordPress GD Rating System...
WordPress ImageInject: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress ImageInject, in order to run JavaScript code in the context of the web site...
irssi: four vulnerabilities
An attacker can use several vulnerabilities of irssi...
PySAML2: privilege escalation
An attacker can bypass restrictions of PySAML2, in order to escalate his privileges...
AWStats: code execution
An attacker can use a vulnerability of AWStats, in order to run code...
OpenCV: integer overflow via FillUniColor/FillUniGray
An attacker can generate an integer overflow via FillUniColor()/FillUniGray() of OpenCV, in order to trigger a denial of service, and possibly to run code...
OpenCV: buffer overflow via cv-PxMDecoder-readData
An attacker can generate a buffer overflow via cv::PxMDecoder::readData() of OpenCV, in order to trigger a denial of service, and possibly to run code...
gdk-pixbuf: integer overflow
An attacker can generate an integer overflow of gdk-pixbuf, in order to trigger a denial of service, and possibly to run code...
gifsicle: use after free
An attacker can force the usage of a freed memory area of gifsicle, in order to trigger a denial of service, and possibly to run code...
Joomla Easy Discuss: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Easy Discuss, in order to run JavaScript code in the context of the web site...
Joomla JB Visa: SQL injection
An attacker can use a SQL injection of Joomla JB Visa, in order to read or alter data...
GraphicsMagick: out-of-bounds memory reading via ReadMNGImage
An attacker can force a read at an invalid address via ReadMNGImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: out-of-bounds memory reading via ReadNewsProfile
An attacker can force a read at an invalid address via ReadNewsProfile() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...
GraphicsMagick: out-of-bounds memory reading via ReadOneJNGImage
An attacker can force a read at an invalid address via ReadOneJNGImage() of GraphicsMagick, in order to trigger a denial of service, or to obtain sensitive information...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 780 781 782 783 784 785 786 787 788 790 792 793 794 795 796 797 798 799 800 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1105