The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Lotus Notes: several vulnerabilities
An attacker can execute code with rights of victims opening a malicious file with Lotus Notes...
Flash Player: several vulnerabilities
Several Adobe Flash Player vulnerabilities can be used by an attacker to execute code...
Squid: denial of service during cache update
An attacker with a Squid account and a web server can stop the proxy...
Windows: privilege elevation via the kernel
An authenticated attacker can send malicious data to the kernel in order to obtain system privileges...
IE: code execution via ActiveX
A HTML page can call a ActiveX in order to execute code on victim's computer...
Windows: poisoning the DNS client
An attacker can predict DNS queries in order to poison the local DNS cache (stub resolver)...
Microsoft Visio: code execution
An attacker can invite the victim to open a malicious file with Microsoft Visio in order to execute code in his computer...
Microsoft Project: code execution
An attacker can invite the victim to open a malicious file with Microsoft Project in order to execute code in his computer...
Internet Explorer: code execution via data stream
An attacker can setup a web site returning malicious data in order to execute code on computer of victims seeing this site...
Windows: code execution via VBScript/JScript
An attacker can create a HTML page containing a VBScript/JScript script encoded in a malicious way in order to execute code on victim's computer...
Windows: code execution via GDI EMF/WMF
An attacker can create a malicious EMF/WMF image in order to execute code when it is displayed...
OTRS: access via SOAP
An attacker can access to OTRS via SOAP without authenticating...
OpenView NNM: several vulnerabilities of ovalarmsrv
An attacker can use several vulnerabilities of the OVALARMSRV service of Openview NNM in order to create a denial of service or to execute code...
m4: code execution
Two vulnerabilities of m4 can be used by an attacker to execute macros or code...
lighttpd: denial of service of SSL
An attacker can prematurely close his SSL session in order to stop all SSL sessions...
CA Alert Notification Server: code execution
An authenticated attacker can use overflows of the CA Alert Notification Server service in order to elevate his privileges...
Opera: code execution
Two vulnerabilities of Opera can be used by an attacker to execute code...
Webwasher: denial of service
An attacker can use a malicious url in order to create a denial of service of Webwasher when it is installed under Linux...
QuickTime: several vulnerabilities
Several QuickTime vulnerabilities can lead to code execution...
Norton AntiVirus, IS: code execution via AutoFix Tool
An attacker can use two vulnerabilities of the SYMADATA.DLL ActiveX in order to execute code on victim's computer...
Solaris: file corruption via inetd
A local attacker can create a symbolic link when inetd logs its debug messages in order to alter a system file...
HP Select Identity: user access
An authenticated attacker can use HP Select Identity to access to accounts of other users...
Apache-SSL: altering variables
An attacker can use a malicious X.509 certificate in order to alter some Apache-SSL environment variables...
Outlook, Windows Mail, Office: HTTP connection via X.509
An attacker can use a malicious X.509 certificate in order to force a program to send a HTTP query...
McAfee ePO: denial of service
An attacker can connect to McAfee ePolicy Orchestrator in order to create a denial of service...
OpenView NNM: buffer overflow of OVAS.EXE
A network attacker can use an overflow of OpenView NNM in order to create a denial of service or to execute code...
IE: vulnerabilities of several ActiveX of April 2008
Several ActiveX can be used by a remote attacker to generate a denial of service or to execute code...
suPHP: privilege elevation
A local attacker can use symbolic links in order to elevate his privileges via suPHP...
GNOME screensaver: unlocking
A local attacker can unlock the GNOME screensaver when authentication is based on a remote directory...
GNOME screensaver: reading the clipboard
A local attacker can read the contents of the clipboard when the screen is locked with GNOME screensaver...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 205 206 207 208 209 210 211 212 213 215 217 218 219 220 221 222 223 224 225 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1037