The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Word: code execution 3
An attacker can create a malicious Word document leading to code execution when it is opened...
ClamAV: denial of service by encapsulation
An attacker can create an email containing several Base64 encapsulations in order to stop ClamAV...
Sophos Anti-Virus: buffer overflow of CPIO and SIT
An attacker can create malicious CPIO or SIT files in order to execute code on computer with privileges of the antivirus...
Solaris: privilege elevation via ld.so
A local attacker can execute code as root by using vulnerabilities of ld.so...
Postfix: denial of service via long headers
An attacker can generate a denial of service by sending an email containing long headers, when milter is active...
Windows: corrupting RIS files
An attacker can alter files of Remote Installation Service in order to execute code on newly installed computers...
Outlook Express: buffer overflow of WAB
A malicious WAB file generates an overflow and leads to code execution...
Windows: privilege elevation via a file manifest
A local attacker can elevate his privileges by generating an overflow in csrss.exe...
Windows: buffer overflow of SNMP Service
An attacker can send a malicious SNMP packet in order to execute code on computer...
IE: several vulnerabilities
Several vulnerabilities of Internet Explorer permit a remote attacker to execute code or to obtain information...
Windows Media Player: buffer overflow via ASX
An attacker can use a malicious ASX file in order to generate an overflow on user's computer...
OpenLDAP: buffer overflow of KBIND
A network attacker can execute code when the --enable-kbind option is activated...
Linux kernel: file overwriting by a core dump
An attacker can overwrite a file during core dump file creation...
Linux kernel: denial of service of ibmtr.c
An attacker can send a malicious Token Ring packet in order to stop system...
Linux kernel: buffer overflow of MadWifi
An attacker with a physical access can generate an overflow in the kernel...
Antivirus: infinite loop via a RAR archive
An attacker can create a malicious RAR archive in order to generate an infinite loop in some antivirus...
phpMyAdmin: bypassing restrictions on IP addresses
An attacker can bypass IP address restriction by faking a proxy header...
PHP: file creation via session_save_path
An attacker can create a PHP program using session_save_path() to bypass open_basedir restriction...
Linux kernel: mount options ignored by smbfs
When Unix extensions are activated, the uid, gid and mode mount options are not honoured for a smbfs filesystem...
Linux kernel: denial of service under PowerPC
Under PowerPC, a local attacker can stop system by using a futex...
l2tpns: buffer overflow of heartbeat packets
An attacker can send a oversized packet of heartbeat type in order to generate an overflow in l2tpns...
ClamAV: denial of service via a base64 attachment
An attacker can create an email containing a malicious base64 attachment in order to stop ClamAV...
Word: code execution 2
An attacker can create a malicious Word document leading to code execution when it is opened...
Windows Media Player: memory corruption via a link
An attacker can use an ASX file containing an unknown protocol in order to generate an overflow in the WMVCORE.DLL library...
Antivirus: bypassing via base64
An attacker can use base64 data containing unexpected characters in order to bypass some antivirus...
Ruby: denial of service of cgi.rb by boundary
An attacker can send a HTTP request containing malformed MIME data in order to generate an infinite loop in cgi.rb...
GnuPG: code execution via OpenPGP filters
An attacker can create a malicious document in order to generate code execution during OpenPGP filters usage...
SAP IGS: file removal
An attacker can use a malicious HTTP request in order to remove a file of system...

   

Direct access to page 1 21 41 61 81 101 121 141 160 161 162 163 164 165 166 167 168 170 172 173 174 175 176 177 178 179 180 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1053