The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Windows: buffer overflow via source routing option
An attacker can send an IP packet containing a malicious option in order to generate a denial of service an eventually to execute code...
Windows: server spoofing even with RPC mutual authentication
An attacker can spoof server identity even if a mutual authentication of RPC service is done over SSL...
Windows: several vulnerabilities of SMB
A network attacker can generate a denial of service or execute code via SMB...
Exchange: script execution in OWA
An attacker can send a malicious email executing Javascript code in OWA...
PowerPoint: buffer overflow
An attacker can create a malicious PowerPoint document leading to code execution when it is opened...
Windows 98, ME: code execution with a WMF file
Displaying a malicious WMF file leads to code execution...
Windows: memory corruption of RRAS and RASMAN
An attacker can use two vulnerabilities of RRAS and RASMAN to execute code...
Windows Media Player: buffer overflow via a PNG image
An attacker can create a malicious PNG image leading to code execution when it is displayed by Windows Media Player...
Windows: memory corruption of JScript
An attacker can create a malicious JScript script leading to code execution on user's computer...
Windows, IE: code execution via an AOL ART image
An attacker can create a malicious ART image leading to code execution...
IE: several vulnerabilities
Several vulnerabilities of Internet Explorer permit a remote attacker to execute code, to generate a denial of service or to spoof the interface...
WebCalendar: PHP code injection
An attacker can use the includedir parameter to inject PHP code in WebCalendar...
Adobe Reader: several vulnerabilities
Several vulnerabilities were announced in Adobe Reader, the worst one leading to code execution...
PHP: file creation with tempnam
A local attacker can use tempnam() to create a file with a predefined name...
GDM: privilege elevation via Login Manager
A local attacker can use the Login Manager without being administrator...
FreeType: several vulnerabilities
An attacker can create a font file leading to several integer overflows or denials of service in FreeType...
GForge: several vulnerabilities
An attacker can use GForge for Cross Site Scripting attacks or to send emails...
xine-ui: format string attacks with a MP3 filename
An attacker can invite user to open a malicious filename generating a format string attack in order to run code with xine-ui...
NetBSD: denial of service via SO_TIMESTAMP option for IPv6
A local attacker can create a socket with SO_TIMESTAMP option and with an IPv6 address in order to stop kernel...
LibTIFF: buffer overflow of tiff2pdf
An attacker can create a malicious TIFF image leading to an overflow in tiff2pdf...
IE, Mozilla, Firefox: local filename reading
An attacker can create a special Javascript code, then invite user to press keys and a button, to upload a file...
SpamAssassin: code execution via vpopmail
With some SpamAssassin configurations, an attacker can execute commands using an email...
Solaris: privilege elevation via StorADE
A local attacker can use StorADE to run code with privileges of another user...
Avast: vulnerability of CHM files
An attacker can create a malicious CHM file in order to generate a vulnerability in Avast antivirus...
Drupal: code execution and Cross Site Scripting
An attacker can use two vulnerabilities against Drupal...
SquirrelMail: file inclusion
An attacker can use a malicious plugins parameter to read a file located on server...
xmcd: partition filling
A local attacker can use xmcd to fill /var partition in order to conduct a denial of service...
OpenLDAP: buffer overflow via the status file
A local attacker can modify the status file in order to generate an overflow in slurpd...

   

Direct access to page 1 21 41 61 81 101 121 141 144 145 146 147 148 149 150 151 152 154 156 157 158 159 160 161 162 163 164 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022