The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Joomla Attachments: SQL injection
An attacker can use a SQL injection of Joomla Attachments, in order to read or alter data...
Bouncy Castle: information disclosure via BKS-V1
An attacker can bypass access restrictions to data via BKS-V1 of Bouncy Castle, in order to obtain sensitive information...
SPIP: vulnerability via valider_xml
A vulnerability via valider_xml() of SPIP was announced...
WordPress Site Editor: directory traversal
An attacker can traverse directories of WordPress Site Editor, in order to read a file outside the service root path...
libid3tag: denial of service via ID3 Unknown Encoding
An attacker can generate a fatal error via ID3 Unknown Encoding of libid3tag, in order to trigger a denial of service...
libid3tag: denial of service via ID3 Unknown Encoding
An attacker can generate a fatal error via ID3 Unknown Encoding of libid3tag, in order to trigger a denial of service...
libid3tag: infinite loop via id3_utf16_deserialize
An attacker can generate an infinite loop via id3_utf16_deserialize() of libid3tag, in order to trigger a denial of service...
libid3tag: infinite loop via id3_utf16_deserialize
An attacker can generate an infinite loop via id3_utf16_deserialize() of libid3tag, in order to trigger a denial of service...
SDL2: multiple vulnerabilities
An attacker can use several vulnerabilities of SDL2...
SDL2: code execution via ILBM
An attacker can use a vulnerability via ILBM of SDL2, in order to run code...
GraphicsMagick: NULL pointer dereference via CINEON
An attacker can force a NULL pointer to be dereferenced via CINEON of GraphicsMagick, in order to trigger a denial of service...
GraphicsMagick: denial of service via PNG
An attacker can generate a fatal error via PNG of GraphicsMagick, in order to trigger a denial of service...
GraphicsMagick: denial of service
An attacker can generate a fatal error of GraphicsMagick, in order to trigger a denial of service...
Exempi: buffer overflow via Excel
An attacker can generate a buffer overflow via Excel of Exempi, in order to trigger a denial of service, and possibly to run code...
Exempi: buffer overflow via TIFF
An attacker can generate a buffer overflow via TIFF of Exempi, in order to trigger a denial of service, and possibly to run code...
LibRaw: buffer overflow
An attacker can generate a buffer overflow of LibRaw, in order to trigger a denial of service, and possibly to run code...
LibRaw: NULL pointer dereference
An attacker can force a NULL pointer to be dereferenced of LibRaw, in order to trigger a denial of service...
LibRaw: buffer overflow
An attacker can generate a buffer overflow of LibRaw, in order to trigger a denial of service, and possibly to run code...
Gitlab: code execution via Project Import
An attacker can use a vulnerability via Project Import of Gitlab, in order to run code...
Gitlab: two vulnerabilities
An attacker can use several vulnerabilities of Gitlab...
Gitlab: four vulnerabilities
An attacker can use several vulnerabilities of Gitlab...
Firefox: buffer overflow via Vorbis Audio Data
An attacker can generate a buffer overflow via Vorbis Audio Data of Firefox, in order to trigger a denial of service, and possibly to run code...
uWSGI: directory traversal via php-docroot
An attacker can traverse directories via php-docroot of uWSGI, in order to read a file outside the service root path...
Libtremor: memory corruption via Codebook
An attacker can generate a memory corruption via Codebook of Libtremor, in order to trigger a denial of service, and possibly to run code...
Libvorbis: memory corruption via Codebook
An attacker can generate a memory corruption via Codebook of Libvorbis, in order to trigger a denial of service, and possibly to run code...
SQLite: NULL pointer dereference via CREATE TABLE AS
An attacker can force a NULL pointer to be dereferenced via CREATE TABLE AS of SQLite, in order to trigger a denial of service...
WordPress Duplicator: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress Duplicator, in order to run JavaScript code in the context of the web site...
Linux kernel: memory corruption via ebtables CONFIG_COMPAT
An attacker can generate a memory corruption via ebtables CONFIG_COMPAT of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
Joomla Google Map Landkarten: SQL injection
An attacker can use a SQL injection of Joomla Google Map Landkarten, in order to read or alter data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 800 801 802 803 804 805 806 807 808 810 812 813 814 815 816 817 818 819 820 821 841 861 881 901 921 941 961 981 1001 1021 1041 1047