The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
HP ProCurve Switch: Cross Site Scripting
An attacker, who is allowed to connect to the administration interface of a HP ProCurve Switch can generate a Cross Site Scripting...
Word: code execution
An attacker can invite the victim to open a malicious Word file in order to execute code on his computer...
Excel: several vulnerabilities
Several Excel vulnerabilities can be used by an attacker to execute code on computers of victims accepting to open a malicious file...
Windows: denial of service of Active Directory
An attacker can use a malicious LDAP/LDAPS query, in order to generate a denial of service in the Active Directory...
Windows: vulnerabilities of the kernel
A local or remote attacker can use three vulnerabilities of the Windows kernel, in order to elevate his privileges or to execute code...
Windows 2000: code execution via License Logging Server
An attacker can use a malicious RPC query in order to generate an overflow in License Logging Server, leading to code execution...
Windows: code execution via WSDAPI
An attacker on the local network can send a malicious packet to the Web Services on Devices Application Programming Interface, in order to execute code on the system...
CUPS: Cross Site Scripting via kerberos
An attacker can use the kerberos parameter, in order to generate a Cross Site Scripting in the CUPS administration web site...
TLS, OpenSSL, GnuTLS: vulnerability of the renegotiation
A remote attacker can use a vulnerability of TLS in order to insert plain text data during a renegotiation via a man-in-the-middle attack...
Linux kernel: NULL dereference via nfs4_proc_lock
A local attacker can use a lock on a NFS file in order to stop the kernel...
Asterisk: several vulnerabilities
An attacker can use several vulnerabilities of Asterisk, in order to create a Cross Site Scripting or detect valid users...
Joomla: several vulnerabilities
Two vulnerabilities of Joomla! can be used by a attacker in order to modify data or obtain information...
Solaris: denial of service via SDP and SCTP
A local attacker can use a memory leak of SDP and SCTP, in order to progressively use all system resources...
IBM TSM: several vulnerabilities of the client
Three vulnerabilities of the IBM Tivoli Storage Manager client can be used by an attacker to execute code...
Adobe Shockwave Player: multiples vulnérabilités
Several Adobe Shockwave Player vulnerabilities permit to generate a denial of service or to execute code...
Solaris: denial of service via SDP
A local or remote attacker can use a memory leak of SDP, in order to progressively use all system resources...
Panda Internet Security: privilege elevation
A local attacker can obtain LocalSystem privileges by creating a Trojan horse in the antivirus installation directory...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 253 254 255 256 257 258 259 260 261 263 265 266 267 268 269 270 271 272 273 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1103