The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Adobe Acrobat/Reader: execution of JavaScript code
Four vulnerabilities affect the Adobe Acrobat/Reader plugin...
Windows SDK: buffer overflow de Message Compiler
An attacker can create a malicious MC file and invite user to compile it in order to execute code on his computer...
Linux kernel: vulnerabilities of EFLAGS under i386
A local attacker can generate a denial of service or elevate his privileges on a i386 processor...
IE: memory corruption via the WinZip ActiveX CreateNewFolderFromName
A vulnerability of the CreateNewFolderFromName() method of WZFILEVIEW ActiveX leads to code execution on user's computer...
ELOG: several vulnerabilities
Several vulnerabilities of ELOG permit an attacker to execute code, to generate a denial of service or to use Cross Site Scripting attacks...
Linux kernel: vulnerability of ISDN PPP
The init_timer() function is not called to initialize the timer during ISDN PPP compression...
Windows: denial of service of NetrWkstaUserEnum
A network attacker can use a RPC request calling NetrWkstaUserEnum() in order to use a large amount of memory...
Windows: privilege elevation via MessageBox
An attacker can use MessageBox with MB_SERVICE_NOTIFICATION in order to execute code with system privileges...
IIS 5.1: shell command execution
An attacker allowed to upload ASP files can run shell commands...
Mono: obtaining application source code
An attacker can obtain source code of applications served by XSP...
JRE, JDK, SDK: access to data of other applets
A malicious applet can access to data of other applets via two vulnerabilities...
NetWare: Cross Site Scripting of Welcome web-app
The Welcome web application permits an attacker to exploit a Cross Site Scripting attack...
JRE, JDK, SDK: two overflows
Two overflows permit a malicious applet to execute code on user's computer...
JRE, JDK, SDK: privilege elevation via serialization
A malicious applet can elevate its privileges via two vulnerabilities of serialization...
Linux kernel: denial of service of mincore
A local attacker can generate a denial of service by locking pages in mincore()...
SeaMonkey: several vulnerabilities
Several vulnerabilities were announced in Seamonkey, the worst one leading to code execution...
Thunderbird: several vulnerabilities
Several vulnerabilities were announced in Thunderbird, the worst one leading to code execution...
Firefox 2.0: several vulnerabilities
Several vulnerabilities were announced in Firefox 2.0, the worst one leading to code execution...
Firefox 1.5: several vulnerabilities
Several vulnerabilities were announced in Firefox 1.5, the worst one leading to code execution...
OpenBSD: bypassing securelevel via SMM
A local administrator can modify securelevel on a Pentium processor...
Dovecot: memory corruption with mmap_disable
When mmap_disable is activated, an authenticated attacker can generate an off by one buffer overflow...
WebSphere AS 6.0.2: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to attack the service...
SQL-Ledger: several vulnerabilities
Several vulnerabilities of SQL-Ledger notably permit a remote attacker to execute code...
D-Bus: denial of service via match_rule_equal
A local attacker can prevent a program using D-Bus to receive a message it is waiting for...
WebSphere AS 5.1.1: vulnerability
A vulnerability of WebSphere AS permits an attacker to attack the service...
NetBSD: buffer overflow of glob
A local or remote attacker can generate an overflow in programs using glob()...
Linux kernel: buffer overflow of Bluetooth via CAPI
An attacker can send long CAPI messages in order to execute code on system...
CA Anti-Virus: denial of service of vetfddnt.sys and vetmonnt.sys
A local attacker can send malicious data to vetfddnt.sys and vetmonnt.sys drivers in order to stop the antivirus...
GDM: format string attack of gdmchooser
An attacker with a physical access can generate a format string attack in gdmchooser...
ProFTPD: buffer overflow of mod_ctrls
An attacker allowed to control ProFTPD can obtain root privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 162 163 164 165 166 167 168 169 171 173 174 175 176 177 178 179 180 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1036