The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: incorrect reseed of xfer_secondary_pool
The xfer_secondary_pool() function does not correctly reseed a buffer containing random data...
Apache Tomcat: several Cross Site Scripting of examples
An attacker can exploit several Cross Site Scripting attacks in Apache Tomcat examples...
Panda AV: integer overflow of EXE
An attacker can create an EXE file generating an integer overflow leading to code execution...
Lotus Notes: obtaining password
By adding a directive in the notes.ini file, an attacker can obtain passwords when users change them...
CA AV eTrust: buffer overflows of Alert service
Several buffer overflows affect Computer Associates products using the Alert service...
Opera: several vulnerabilities
Three vulnerabilities of Opera permit to execute code or to spoof the interface...
Bochs: several vulnerabilities
Two vulnerabilities of Bochs permit an attacker to elevate his privileges or to generate a denial of service...
tcpdump: buffer overflow of BGP
An attacker can send a long BGP packet in order to generate an overflow in tcpdump...
JRE, JDK, SDK: connection to a local port
A Java applet can connect to a local port of victim's computer...
Cisco WAAS: denial of service
An attacker can use a synflood in order to generate a denial of service on Cisco WAAS...
Asterisk: several vulnerabilities
Four vulnerabilities of Asterisk permit a remote attacker to generate a denial of service or to execute code...
Thunderbird: several vulnerabilities
Several vulnerabilities were announced in Thunderbird, the worst one leading to code execution...
Firefox: several vulnerabilities
Several vulnerabilities were announced in Firefox, the worst one leading to code execution...
Oracle AS: several vulnerabilities of July 2007
Several vulnerabilities are corrected by CPU of July 2007...
Oracle Database: several vulnerabilities of July 2007
Several vulnerabilities are corrected by CPU of July 2007...
Kaspersky AV: denial of service on FW-1
An attacker can generate a denial of service on Kaspersky Anti-Virus 5.5 for Check Point Firewall-1...
PHP: memory corruption via glob
An attacker can create a script using glob() in order to generate a denial of service or to execute code...
Konqueror, Opera: address bar spoofing
An attacker can use the data: uri in order to spoof the content of the address bar...
IE, Firefox: protocol handlers vulnerabilities
Several vulnerabilities were announced in protocol handlers available from web browsers...
IE: address bar spoofing
An attacker can create a website forcing victim to stay on the site, whereas the address bar changes...
RSA ACE/Server, SecurID: buffer overflow of Progress Server
An attacker can generate a buffer overflow on Progress Server in order to execute code on system...
libarchive: several vulnerabilities
A malicious tar or cpio archive can generate a denial of service or code execution on libarchive tools...
QuickTime: several vulnerabilities
Several QuickTime vulnerabilities can lead to code execution...
Symantec AV, SGS, WS, Norton AV, IS, PF: vulnerabilities of RAR and CAB
Two vulnerabilities of Symantec and Norton products lead to a denial of service or to code execution...
Symantec AV, Norton AV, IS, PF: privilege elevation via SymTDI.sys
A local attacker can use the SymTDI.sys driver in order to elevate his privileges...
Symantec AV: privilege elevation via RTVScan
A local attacker can use the notification service of RTVScan in order to elevate his privileges...
Symantec AV: buffer overflow of Internet E-mail Auto-Protect
An attacker can send a malicious email in order to execute code on Internet E-mail Auto-Protect...
MySQL 5.0: several vulnerabilities
Several vulnerabilities of MySQL permit an attacker to elevate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 182 183 184 185 186 187 188 189 191 193 194 195 196 197 198 199 200 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1090