The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
WebSphere AS 6.0.2: several vulnerabilities
Several vulnerabilities of WebSphere AS can be used to attack the service...
Docutils: file corruption via emacs and reStructuredText
A local attacker can invite the victim to open a reStructuredText file with emacs, in order to corrupt one of his files...
Linux kernel: file modification via EXT4_IOC_MOVE_EXT
On an ext4 filesystem, a local attacker can move "extents", in order to alter files owned by other users...
Webmin, Usermin: Cross Site Scripting
An attacker can generate a Cross Site Scripting in Webmin and Usermin...
Sun Ray: code execution via Authentication Manager
An unauthenticated attacker can generate a denial of service or execute code with root privileges on Sun Ray Authentication Manager...
Sun Ray: data capture from DTU
An attacker can capture data from keyboard, mouse and screen, which is exchanged between a Sun Ray DTU and the Sun Ray Server...
SAP: denial of service of SAP Management Console
An attacker can send a malicious query to the SAP Management Console, in order to stop it...
Linux kernel: denial of service of virtio
An attacker in a guest KVM/QEMU system can use virtio, in order to stop the guest system...
GNU coreutils: file corruption via distcheck
When distributions done by GNU coreutils are checked, a local attacker can alter a file...
BlackBerry ES: memory corruptions via PDF
Several vulnerabilities of PDF Distiller can be used by an attacker to create a denial of service or to execute code in BlackBerry Enterprise Server...
HP OpenView Data Protector Application Recovery Manager: stack overflow
A remote attacker can generate a denial of service or execute code in HP OpenView Data Protector Application Recovery Manager...
Jboss EAP: several vulnerabilities
Several vulnerabilities affect JBoss EAP...
Linux kernel: memory corruption via HFS
An local attacker can create a specially crafted HFS filesystem in order to corrupt memory and possibly execute code...
Cisco, Juniper, Microsoft, Nortel, Stonesoft: vulnerability of SSL VPN
A weakness in the conception of some Clientless SSL VPN products can be used by an attacker in order to obtain information from other web sites visited by the victim...
HP OpenView Network Node Manager: several vulnerabilities
Several vulnerabilities of HP OpenView Network Node Manager lead to code execution...
Firefox: window spoofing
An attacker can create a JavaScript window, which appears to come from another web site...
VLC: buffer overflow of a RTSP url
An attacker can invite the victim to open a playlist containing a long RTSP url, in order to execute code on his computer...
FreeBSD: reading configuration files via freebsd-update
A local attacker can read configuration files copied by freebsd-update...
Linux kernel: denial of service of mac80211
An attacker can send malicious 802.11 packets, in order to stop the system...
NTP: denial of service
A remote attacker can send a specially crafted NTP MODE_PRIVATE query in order to generate a denial of service...
Linux kernel: denial of service via KVM
An attacker in a KVM guest system can use a long x86 instruction, in order to generate a denial of service...
Adobe Flash Player: several vulnerabilities
Several Adobe Flash Player vulnerabilities can be used by an attacker to execute code or to obtain information...
GRUB: brute force attack
A local attacker can easily do a brute force on the GRUB password...
Internet Explorer 8: Cross Site Scripting of the anti-XSS
An attacker can use the Anti Cross Site Scripting feature of Internet Explorer 8, in order to create a Cross Site Scripting attack...
MySQL: several vulnerabilities
An attacker can use several vulnerabilities of MySQL, in order to generate a denial of service, or to access to users' tables...
PHP 5.3: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to create a denial of service or to execute code...
expat: denial of service via XML in big2_toUtf8
An attacker can create XML data containing a malicious character, in order to create a denial of service in expat...
expat: denial of service via XML
An attacker can create XML data containing a malicious character, in order to create a denial of service in expat...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 256 257 258 259 260 261 262 263 264 266 268 269 270 271 272 273 274 275 276 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1105