The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Java JRE/JDK/SDK: several vulnerabilities
Several vulnerabilities of Java JRE/JDK/SDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code...
Linux kernel: NULL dereference via pipe_x_open
A local attacker can use numerous pipes in order to stop the kernel or to execute privileged code...
IE: vulnerabilities of several ActiveX of November 2009
Several ActiveX can be used by a remote attacker to generate a denial of service or to execute code...
Solaris Trusted Extensions: unlocked XScreenSaver
When Solaris Trusted Extensions are enabled, the XScreenSaver locker may not start...
NSPR: memory corruptions
An attacker can use two vulnerabilities of NSPR, in order to generate a denial of service, or to execute code...
Pacemaker: multiple vulnerabilities
Several vulnerabilities of Pacemaker can be used by an attacker to create a denial of service or possibly to execute code...
BSD: memory corruption via printf
When the attacker can choose a real value, and its display format by a function of the printf() family, he can generate a memory corruption leading to a denial of service or to code execution...
Linux kernel: access to debug registers
An attacker located in a KVM guest can access to debug registers, which can lead to a denial of service...
OpenBSD: denial of service via getsockopt
A local attacker can use the getsockopt() function, in order to stop the system...
Solaris: privilege elevation via Trusted Extensions
When Solaris Trusted Extensions is enabled, a remote attacker can use XTEST to elevate his privileges...
Opera: three vulnerabilities
Three vulnerabilities were announced in Opera, where the worst one leads to code execution...
VMware: two vulnerabilities
An attacker can use two vulnerabilities of VMware products, in order to elevate his privileges, or to obtain a file...
Wireshark 1.2: denials of service
Several vulnerabilities of Wireshark 1.2 can be used by a remote attacker to create a denial of service...
Wireshark 1.0: denials of service
Several vulnerabilities of Wireshark 1.0 can be used by a remote attacker to create a denial of service...
F-Secure, McAfee, Symantec: bypassing via PDF
An attacker can create a malicious PDF document which is not detected by F-Secure, McAfee and Symantec products...
KDE: three vulnerabilities
An attacker can use three vulnerabilities of KDE, in order to obtain sensitive information...
SeaMonkey: several vulnerabilities
Several vulnerabilities of SeaMonkey can be used by an attacker to execute code on victim's computer...
Firefox 3.5: several vulnerabilities
Several vulnerabilities of Firefox 3.5 can be used by an attacker to execute code on victim's computer...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 252 253 254 255 256 257 258 259 260 262 264 265 266 267 268 269 270 271 272 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103