The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Apache httpd: htpasswd salt predictable
The salt used by htpasswd is predictable, which facilitates brute force attacks...
FreeBSD: file reading via sendfile
A local attacker can use the sendfile() system call to obtain the contents of an unreadable file...
FortiClient: privilege elevation
A local attacker can obtain system privileges via a vulnerability of fortimon.sys driver...
OpenCA: Cross Site Request Forgery
When OpenCA administrator sees a malicious web page, a certificate can be created...
F-Secure AV, IS: evasion via CAB and RAR
An attacker can create a CAB or RAR archive containing a virus which is not detected by the antivirus...
Cacti: several vulnerabilities
Several vulnerabilities of Cacti permit an attacker to obtain information or to inject SQL code...
PCRE: buffer overflow via UTF-8
When attacker can change the regular expression used by a program, he can corrupt its memory in order for example to execute code...
Mailman: Cross Site Scripting
An attacker can conduct a Cross Site Scripting attack on Mailman...
OpenLDAP: denial of service via NOOP/rdn
An authenticated attacker can modify a DN with NOOP in order to stop slapd...
Office: code exécution
An attacker can create a malicious Microsoft Office document leading to code execution when it is opened...
Publisher: code execution
An attacker can create a malicious Publisher document leading to code execution when it is opened...
Office: vulnerabilities of Works converter
An attacker can create a malicious WPS file leading to code execution when it is opened and converted by Office...
Internet Explorer: several vulnerabilities
Several vulnerabilities of Internet Explorer lead to code execution...
Word: code execution
An attacker can create a malicious Word document leading to code execution when it is opened...
Windows: buffer overflow of OleLoadPicture
An attacker can create a web site containing a malicious OLE object leading to code execution when victim browses this site...
Windows: code execution via WebDAV Mini-Redirector
An attacker can create a malicious WebDAV server in order to execute code on computers which connect via WebDAV Mini-Redirector...
IIS: code execution
A remote attacker can execute code on IIS with privileges of WPI...
IIS: privilege elevation
A local attacker, allowed to create a file in the root directory of IIS, can elevate his privileges...
Windows Vista: denial of service of TCP/IP
An attacker can setup a DHCP server returning a malicious packet in order to stop the system...
Windows: denial of service of Active Directory and ADAM
An attacker can send a malicious LDAP packet in order to generate a denial of service on the Active Directory or ADAM...
Unix: file overwrite via cp
In a particular case, a local attacker can alter files when the victim copies files...
mod_jk2: buffer overflow of Host
An attacker can create an overflow in the mod_jk2 connector in order to execute code...
Webmin, Usermin: Cross Site Scripting protection
Webmin and Usermin software are frequently the target of Cross Site Scripting attacks...
Novell Client: buffer overflow of NWSPOOL.DLL
A RPC attacker can create an overflow in the EnumPrinters function of NWSPOOL.DLL in order to execute code on computer...
ClamAV: several vulnerabilities
An attacker can use several vulnerabilities of ClamAV in order to execute code on server...
Linux kernel: vserver access
On a kernel with vserver, a local attacker can access to resources of other vservers...
WML: file corruptions
A local attacker can alter a file during WML usage...
Firefox: bypassing anti-phishing
An attacker can use special urls in order to bypass the phishing detection mechanism...
Firefox: information disclosure
An attacker can create a HTML page to read files located in the Firefox installation directory...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 200 201 202 203 204 205 206 207 208 210 212 213 214 215 216 217 218 219 220 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013