The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco IOS / IOS XE: security improvement of Smart Install
The security of Cisco IOS / IOS XE can be improved by securing Smart Install...
Joomla com_foxcontact: file upload
An attacker can upload a malicious file on Joomla com_foxcontact, in order for example to upload a Trojan...
libming: NULL pointer dereference via pushdup
An attacker can force a NULL pointer to be dereferenced via pushdup() of libming, in order to trigger a denial of service...
libming: six vulnerabilities
An attacker can use several vulnerabilities of libming...
libming: buffer overflow via printDefineFont2
An attacker can generate a buffer overflow via printDefineFont2 of libming, in order to trigger a denial of service, and possibly to run code...
Joomla VirtueMart: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla VirtueMart, in order to run JavaScript code in the context of the web site...
WordPress File Upload: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of WordPress File Upload, in order to run JavaScript code in the context of the web site...
TYPO3 Core: Cross Site Scripting via Site Name
An attacker can trigger a Cross Site Scripting via Site Name of TYPO3 Core, in order to run JavaScript code in the context of the web site...
libxml2: denial of service via xz_head
An attacker can generate a fatal error via xz_head() of libxml2, in order to trigger a denial of service...
Koji: read-write access
An attacker can bypass access restrictions of Koji, in order to read or alter data...
F5 BIG-IP DNS/GTM: read-write access via DNS Hijacking
An attacker can bypass access restrictions via DNS Hijacking of F5 BIG-IP DNS/GTM, in order to read or alter data...
SquirrelMail: directory traversal
An attacker can traverse directories of SquirrelMail, in order to read a file outside the service root path...
sam2p: four vulnerabilities
An attacker can use several vulnerabilities of sam2p...
sam2p: buffer overflow via LoadPCX
An attacker can generate a buffer overflow via LoadPCX() of sam2p, in order to trigger a denial of service, and possibly to run code...
ImageMagick: use after free via WriteEPTImage
An attacker can force the usage of a freed memory area via WriteEPTImage() of ImageMagick, in order to trigger a denial of service, and possibly to run code...
ImageMagick: denial of service via IsWEBPImageLossless
An attacker can generate a fatal error via IsWEBPImageLossless() of ImageMagick, in order to trigger a denial of service...
ImageMagick: NULL pointer dereference via saveBinaryCLProgram
An attacker can force a NULL pointer to be dereferenced via saveBinaryCLProgram() of ImageMagick, in order to trigger a denial of service...
ImageMagick: NULL pointer dereference via GetOpenCLCachedFilesDirectory
An attacker can force a NULL pointer to be dereferenced via GetOpenCLCachedFilesDirectory() of ImageMagick, in order to trigger a denial of service...
spice-gtk: memory corruption
An attacker can generate a memory corruption of spice-gtk, in order to trigger a denial of service, and possibly to run code...
Spring Framework: information disclosure via Multipart Content
An attacker can bypass access restrictions to data via Multipart Content of Spring Framework, in order to obtain sensitive information...
Spring Framework: directory traversal via Spring MVC
An attacker can traverse directories via Spring MVC of Spring Framework, in order to read a file outside the service root path...
Spring Framework: code execution via spring-messaging
An attacker can use a vulnerability via spring-messaging of Spring Framework, in order to run code...
F5 BIG-IP ASM: Cross Site Request Forgery via Token Not Renewed
An attacker can trigger a Cross Site Request Forgery via Token Not Renewed of F5 BIG-IP ASM, in order to force the victim to perform operations...
Graphite: NULL pointer dereference via Segment.cpp
An attacker can force a NULL pointer to be dereferenced via Segment.cpp of Graphite, in order to trigger a denial of service...
GNU patch: code execution via ed
An attacker can use a vulnerability via ed of GNU patch, similar to VIGILANCE-VUL-17557, in order to run code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 807 808 809 810 811 812 813 814 815 817 819 820 821 822 823 824 825 826 827 841 861 881 901 921 941 961 981 1001 1021 1041 1047