The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of CVS

CVS: code execution via ssh
An attacker can use a vulnerability via ssh of CVS, in order to run code...
CVE-2017-12836, DLA-1056-1, DSA-3940-1, FEDORA-2017-97eb475d93, FEDORA-2017-e5a78c5ca9, openSUSE-SU-2017:2483-1, USN-3399-1, VIGILANCE-VUL-23510
CVS: buffer overflow via proxy_connect
When the CVS client uses a malicious HTTP proxy, it can generate an overflow in the client, in order to stop it, or to execute code...
784141, BID-51943, CERTA-2012-AVI-098, CVE-2012-0804, DSA-2407-1, FEDORA-2012-1383, FEDORA-2012-1400, MDVSA-2012:044, openSUSE-SU-2012:0310-1, RHSA-2012:0321-01, VIGILANCE-VUL-11349
CVS: integer overflow via RCS
An attacker can upload a malicious RCS file in a CVS repository, in order to execute code on computers of CVS clients...
642146, BID-44528, CVE-2010-3846, FEDORA-2010-16599, FEDORA-2010-16600, FEDORA-2010-16721, RHSA-2010:0918-01, VIGILANCE-VUL-10085
Our database contains other pages. You can request a free trial to read them.

Display information about CVS: