The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
NDISWrapper: buffer overflows
A WiFi attacker can create several overflows in NDISWrapper in order to execute code on the system...
HP Tru64 UNIX: privilege elevation via AdvFS
A local attacker can use AdvFS in order to elevate his privileges...
VMware: two vulnerabilities
Two vulnerabilities of VMware can be used by an attacker to elevate his privileges...
VLC: two buffer overflows
An attacker can create a malformed file in order to create a denial of service or to execute code on computers of VLC users...
GNU Enscript: buffer overflow via escape setfilename
An attacker can invite the victim to convert a malicious file with GNU Enscript in order to execute code on his computer...
Cisco IOS, CatOS: denial of service via VTP
An attacker can send a malicious VTP packet on the local network in order to restart the system...
Nagios: command execution
An attacker can send a malicious query to Nagios in order to execute a command on the server...
IE: vulnerabilities of several ActiveX of November 2008
Several ActiveX can be used by a remote attacker to generate a denial of service or to execute code...
Adobe Reader 8: several vulnerabilities
Several vulnerabilities were announced in Adobe Acrobat/Reader...
Adobe Acrobat/Reader: buffer overflow of util.printf
An attacker can create a malicious PDF file in order to execute code on computers of victims opening this document...
Linux kernel: memory corruption of vDSO
A local attacker can create a memory corruption in vDSO in order to generate a denial of service or to elevate his privileges...
HP SMH: local access
An attacker can use a vulnerability of HP System Management Homepage, in order to access to the local system...
ClamAV: several vulnerabilities
An attacker can use several vulnerabilities of ClamAV in order to create a denial of service or to execute code on the server...
UW IMAP: buffer overflow of dmail/tmail
In some cases, an attacker can create an overflow in dmail/tmail commands of UW IMAP in order to execute code...
Sun Web Proxy Server: buffer overflow of Vary/Via
An attacker can use malicious headers in order to execute code in Sun Java System Web Proxy Server...
Linux kernel: buffer overflow of uvcvideo
An attacker can create an overflow in the UVC driver in order to create a denial of service or to execute code...
JRE, JDK, SDK: file access via BasicService
A Java application can use BasicService of Java Web Start in order to open a document...
Net-SNMP: denial of service via GETBULK
An attacker can create a denial of service by requesting numerous data with GETBULK...
Opera: code execution via OnError
An attacker can use the OnError event feature in order to execute commands located on victim's computer...
Opera: Cross Site Scripting of Links panel
An attacker can create a document containing a malicious url in order to generate a Cross Site Scripting during its display in the Links panel...
IBM TSM: buffer overflow of the Backup-Archive client
An attacker can generate an overflow in the Backup-Archive client of IBM Tivoli Storage Manager in order to execute code...
OpenOffice: code execution via WMF/EMF
Two vulnerabilities of OpenOffice.org can be used by an attacker to execute code on computer of victims opening a malicious WMF/EMF document...
Opera: command execution via History Search
An attacker can use the History Search feature in order to execute commands located on victim's computer...
Lynx: two vulnerabilities
Two vulnerabilities of Lynx can be used by a local or remote attacker to execute code on victim's computer...
IE6: address bar spoofing
An attacker can use special characters in order to alter the display of the address bar in IE6 to deceive users...
Linux kernel: buffer overflow of sunrpc/transports
A local attacker can read /proc/sys/sunrpc/transports in order to create an overflow in the kernel...
Bintec R: poisoning the DNS cache
An attacker can send malicious DNS queries in order to poison the DNS cache of Bintec R...
Zope: HTTP injection
An attacker can inject HTTP data in a Zope session...
imlib2: several vulnerabilities
An attacker can create a malicious image leading to code execution when it is displayed by imlib2...
Windows: code execution via Server Service
A network attacker can send a malicious RPC query to the server service in order to execute code on the computer...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 222 223 224 225 226 227 228 229 231 233 234 235 236 237 238 239 240 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022