The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Microsoft MDAC, IE: memory corruption via ADODB.Connection.Execute
An attacker can use the Execute() method of ADODB.Connection in order to execute code on victim's computer...
Windows, IE: memory corruption of HTML Help
An attacker can corrupt memory of HTML Help ActiveX in order to execute code on victim's computer...
Windows: privilege elevation via Windows Image Acquisition
A local attacker can send a malicious message to the Windows Image Acquisition service in order to elevate his privileges...
Windows: privilege elevation via Shell Hardware Detection
A local attacker can send a malicious parameter to the Shell Hardware Detection service in order to elevate his privileges...
Microsoft Interactive Training: buffer overflow
An attacker can create a malicious file generating an overflow in Microsoft Step-by-Step Interactive Training...
IE: several vulnerabilities
Several vulnerabilities of Internet Explorer permit a remote attacker to execute code...
Cisco IOS: vulnerabilities of IPS
An attacker can bypass the IPS or generate a denial of service...
Smb4K: several vulnerabilities
Several vulnerabilities of Smb4K permit a local attacker to alter files or to elevate his privileges...
PHP: overflow of str_ireplace
A local attacker can generate an off-by-one overflow in str_ireplace()...
Solaris: user access via telnet
A vulnerability in the telnet daemon of Solaris permits a remote attacker to login under any account...
PHP 5: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to conduct a denial of service, to execute code or to obtain information...
HP OpenView Storage Data Protector: code execution
A local attacker can use HP OpenView Storage Data Protector to execute code with elevated privileges...
OpenView NNM: altering files of Console
A local attacker can alter files of NNM Console installed on Windows...
Trend Micro: privilege elevation via TmComm of RCM
A local attacker can use the TmComm interface of the Anti-Rootkit Common Module in order to execute code with system privileges...
Trend Micro: buffer overflow of UPX
An attacker can create a malicious UPX program in order to run code on Trend Micro antiviruses...
pam_ssh: keys with blank password allowed
A local user can use pam_ssh with an unprotected private key...
Tru64 UNIX: information disclosure with ps
A local attacker can obtain environment variables of users via the ps command...
Avast: access without password
A local attacker can access to Avast configuration without knowing the password...
libgd: several vulnerabilities
Several vulnerabilities of libgd can lead to denials of services or to code execution...
libgd: memory corruption via a font
An attacker can create a malicious font in order to corrupt memory of libgd...
Firefox: reading files via the popup blocker
An attacker can create a HTML page in order to read a file from victim's computer...
Samba: denial of service and code execution
An attacker can generate a denial of service or execute code on Samba server...
PostgreSQL: denial of service of tables
A local attacker can change the type of a column in order to stop service...
PostgreSQL: denial of service of functions
A local attacker can modify the return type of functions in order to stop service...
mpg123: denial of service
A web site can prematurely close the session in order to generate an infinite loop in mpg123...
Bugzilla: two vulnerabilities
A local attacker can obtain information or use a Cross-Site Scripting attack against Bugzilla...
Linux kernel: memory corruption via listxattr
When the filesystem has an error, the listxattr() function can corrupt memory...
Excel: code execution
An attacker can create a malicious Excel document leading to code execution when it is opened...

   

Direct access to page 1 21 41 61 81 101 121 141 161 165 166 167 168 169 170 171 172 173 175 177 178 179 180 181 182 183 184 185 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1092