The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Microsoft Active Accessibility: code execution via DLL Preload
An attacker can create a malicious DLL and invite the victim to open a document in the same directory, in order to execute code...
2 Opera: memory corruption via SVG
An attacker can invite the victim to display an HTML document containing nested SVG data, in order to corrupt the memory, which leads to a denial of service and possibly to code execution...
2 libxml2: double free via XPath
An attacker can use a special XPath expression, in order to create a double memory free in libxml2, leading to a denial of service or to code execution...
1 Psi IM: certificate spoofing via QLabel
An attacker can use an X.509 certificate with a malicious Common Name, in order to deceive the victim who uses Psi...
2 VLC: denial of service via httpd
When the victim enabled the web interface of VLC, an attacker can use a malicious query, in order to stop it...
3 Symantec Mail Security: vulnerabilities of Autonomy KeyView
An attacker can use several vulnerabilities of Autonomy KeyView, in order to execute code in Symantec Mail Security...
1 AIX: denial of service via QLogic Fibre Channel
When the system has a QLogic Fibre Channel device, a local attacker can stop it...
3 LibreOffice: three vulnerabilities
An attacker can invite the victim to open a malicious Word document with LibreOffice, in order to execute code on his computer...
2 Apache httpd: access to another server via mod_proxy
An attacker can use a malicious HTTP query, when mod_proxy uses RewriteRule or ProxyPassMatch, in order to access to web resources of another server...
3 Cisco ASA: several vulnerabilities
Several vulnerabilities of Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module can be used by an attacker to create a denial of service or to bypass the authentication...
3 Cisco Firewall Services Module: several vulnerabilities
Several vulnerabilities of Cisco Firewall Services Module can be used by an attacker to create a denial of service or to bypass the authentication...
2 Openswan: denial of service via KEY_LENGTH
An attacker can send an ISAKMP message with an invalid KEY_LENGTH attribute, in order to restart Openswan...
3 Cyrus IMAPd: access to NTTP without authentication
An attacker can access to the NNTP service of Cyrus IMAPd, without entering a password...
2 Adobe Flash Player: vulnerability
One or several vulnerabilities impact Adobe Flash Player...
1 Perl Crypt-DSA: obtaining private key
When Perl Crypt::DSA is used on a system without /dev/random, such as Windows, an attacker can use two signatures in order to retrieve the victim's private key...
3 Zope: command execution via OFS
An attacker can use a special query, in order to execute code on Zope...
2 VMware Workstation, Player: buffer overflow via UDF
An attacker can create a malicious ISO image, in order to create an overflow during the analysis of UDF data, which leads to code execution during its usage in VMware Workstation or Player...
3 FFmpeg: several vulnerabilities
An attacker can create a malicious video, and invite the victim to display it with an application linked to FFmpeg, in order to stop it or to execute code on his computer...
2 Perl Digest: code execution via new
When the attacker can indicate the algorithm name in the Perl Digest->new() method, he can execute code...
2 Perl FCGI: variable disclosure
When a CGI script uses the Perl FCGI or CGI::Fast module, an attacker can obtain variables defined during the first query...
2 phpPgAdmin: two Cross Site Scripting
An attacker can use two Site Scripting of phpPgAdmin, in order to execute JavaScript code in the context of the web site in the victim's web browser...
1 KDE: certificate spoofing via KSSL and Rekonq
An attacker can use an X.509 certificate with a malicious Common Name, in order to deceive the victim who uses KSSL or Rekonq...
2 Perl: memory corruption via GLOB_ALTDIRFUNC
When an attacker can transmit a flag to the Perl File::Glob::bsd_glob() function, he can corrupt the memory, in order to create a denial of service or to execute code...
3 Cisco Unified Communications Manager: denial of service via SIP
An attacker can use malformed SIP packets, in order to create a memory leak, leading to a denial of service...
3 Cisco IOS: several vulnerabilities
Several vulnerabilities of Cisco IOS can be used by a remote attacker to create a denial of service, and possibly to execute code...
4 SeaMonkey: several vulnerabilities
Several vulnerabilities of SeaMonkey can be used by an attacker to execute code on victim's computer...
4 Thunderbird 5, 6: several vulnerabilities
Several vulnerabilities of Thunderbird can be used by an attacker to execute code on victim's computer...
4 Firefox 4, 5, 6: several vulnerabilities
Several vulnerabilities of Firefox can be used by an attacker to execute code on victim's computer...
2 TYPO3: vulnerabilities of extensions
An attacker can use several vulnerabilities of TYPO3 extensions in order to generate a Cross Site Scripting or to inject SQL code...
2 FreeBSD: buffer overflow via Unix Socket
A local attacker can use a Unix socket, in order to create an overflow in the FreeBSD kernel...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 315 316 317 318 319 320 321 322 323 325 327 328 329 330 331 332 333 334 335 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 994