The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Windows Vista: privilege elevation via CSRSS
A local attacker can elevate his privileges via ApiPort of CSRSS...
Windows: memory reading and denial of service via NtRaiseHardError
A local attacker can read memory or stop system via NtRaiseHardError() function of CSRSS...
Microsoft Agent: memory corruption via an url
An attacker can use a malicious url leading to code execution in Microsoft Agent...
Windows: buffer overflow of UPnP
A network attacker can exploit an overflow in UPnP in order to execute code...
Microsoft Content Management Server: multiple vulnerabilities
Two vulnerabilities affect Microsoft Content Management Server, the worst one leads to code execution...
HP-UX: denial of service of get_mib_info
A local attacker can stop system by depleting its memory with get_mib_info()...
HP-UX: privilege elevation via PFS
A remote attacker can elevate his privileges via PFS...
Linux kernel: denial of service of AppleTalk
A network attacker can send an AppleTalk packet generating an error in kernel in order to stop it...
Webmin: Cross Site Scripting of chooser.cgi
An attacker can generate a Cross Site Scripting in Webmin...
PHP: denial of service of WBMP
A local attacker can generate a denial of service by using a WBMP image...
PHP: newline injection in filter_var
An attacker can inject a newline at the end of emails filtered via filter_var()...
man-db: buffer overflow of -H
A local attacker can use a malicious -H parameter in order to execute code with man user rights...
Symantec Enterprise Security Manager: remote upgrade
An attacker can conduct a remote upgrade of Symantec Enterprise Security Manager without authentication...
WebSphere AS 6.1.0: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to obtain information or to attack the service...
Snort: several vulnerabilities
Several vulnerabilities were announced in memory copies and handling of Snort...
SQL-Ledger, LedgerSMB: SQL command injection
An attacker can inject SQL commands in SQL-Ledger or LedgerSMB...
Kaspersky AV: several vulnerabilities
Several vulnerabilities of Kaspersky Anti-Virus permit an attacker to download information or to execute code...
Linux kernel: buffer overflow of capi_cmsg2str and capi_message2str
A local attacker can create an overflow in two functions of CAPI library in order to generate a denial of service or to elevate his privileges...
SAP: several vulnerabilities of RFC
The SAP RFC interface has several vulnerabilities...
Qt, KJS: incorrect decoding of UTF-8
The Qt library does not correctly filter long UTF-8 sequences, which can lead to data injection...
X.Org, FreeType: integer overflows
A local attacker can exploit overflows in X in order to elevate his privileges...
MIT krb5: several vulnerabilities
Three vulnerabilities affect telnetd, kadmind and KDC...
Windows: several vulnerabilities of GDI
A local or remote attacker can create malicious programs or images in order to generate a denial of service or code execution on victim's computer...
AIX: buffer overflow of drmgr
A local attacker can generate an overflow in drmgr in order to obtain root privileges...
Norton AV/IS, Symantec AV: dénial of service in SPBBCDrv.sys
A local attacker can create a denial of service in SPBBCDrv.sys driver installed by Symantec/Norton...
ImageMagick: vulnerabilities via a DCM or XWD image
An attacker can create a malicious DCM or XWD image leading to a denial of service or to code execution on computers of ImageMagick users...
POP: man in the middle attack on APOP
An attacker can obtain information on password during a APOP authentication...
Solaris: denial of service of mblk_t
An attacker can generate a high rate TCP throughput in order to cause an error in mblk_t structure handling...
PHP: reading memory via iptcembed
A local attacker can use the iptcembed() function in order to read memory content of php process...

   

Direct access to page 1 21 41 61 81 101 121 141 161 171 172 173 174 175 176 177 178 179 181 183 184 185 186 187 188 189 190 191 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1092