The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
expat: descriptor leak via readfilemap
An attacker can invite an application linked to expat to use an invalid XML data source, in order to generate a file descriptor leak, leading to a denial of service...
HP Performance Manager: code execution
A remote attacker can use the PMParamHandler parameter of HP Performance Manager, in order to create a file with system privileges, which leads to code execution...
TYPO3: four vulnerabilities
An attacker can use four vulnerabilities of TYPO3, in order to obtain information, or to create a Cross Site Scripting...
HP-UX: access to WBEM data
A local or remote attacker can read or alter diagnostic data of WBEM...
TYPO3: vulnerabilities of extensions
An attacker can use several vulnerabilities of TYPO3 extensions in order to generate a Cross Site Scripting, to inject SQL, to obtain information, or to execute code...
ClamAV: denial of service via ScanOLE2
An attacker can use a malicious Microsoft Outlook .dbx document, in order to stop ClamAV...
Wireshark 1.6: five vulnerabilities
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service or to execute code...
Wireshark 1.4: four vulnerabilities
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service or to execute code...
expat: memory leak of poolGrow
An attacker can send special XML data to an application linked to expat, in order to generate a memory leak, leading to a denial of service...
Opera: six vulnerabilities
An attacker can invite the victim to display a malicious site with Opera, in order to deceive the victim, to obtain information, or to execute a program...
cifs-utils: file detection via mount.cifs
A local attacker can use the mount.cifs command, in order to detect if a directory or a file exists...
MySQL: two vulnerabilities
An attacker can use two vulnerabilities of MySQL...
file: denial of service via CDF
An attacker can invite the victim to open a malicious CDF document with the "file" tool, in order to stop the process...
Raptor: file reading via RDF with an XML external entity
An attacker can invite the victim to open a malicious RDF file with an application linked to Raptor, in order to obtain a copy of victim's files...
OpenOffice.org: file reading via ODF with an XML external entity
An attacker can invite the victim to open a malicious file with OpenOffice.org, to save it, and then to return the saved file, in order to obtain a copy of victim's files...
LibreOffice: file reading via ODF with an XML external entity
An attacker can invite the victim to open a malicious file with LibreOffice, to save it, and then to return the saved file, in order to obtain a copy of victim's files...
libzip: two vulnerabilities via ZIP
An attacker can invite the victim to open a malformed ZIP archive, in order to obtain information, to create a denial of service or to execute code in applications linked to libzip...
Grisoft AVG Anti-Virus: bypassing via RAR, TAR, ZIP
An attacker can create an archive containing a virus, which is not detected by Grisoft AVG Anti-Virus...
Avast Antivirus: bypassing via RAR, TAR
An attacker can create an archive containing a virus, which is not detected by Avast Antivirus...
eTrust Antivirus: bypassing via CAB, ELF
An attacker can create an archive or a program containing a virus, which is not detected by eTrust Antivirus...
F-Secure Anti-Virus: bypassing via ELF, EXE, RAR, TAR
An attacker can create an archive or a program containing a virus, which is not detected by F-Secure Anti-Virus...
TrendMicro antivirus: bypassing via CAB, RAR, TAR, ZIP
An attacker can create an archive containing a virus, which is not detected by TrendMicro antivirus...
McAfee antivirus: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by McAfee antivirus...
Fortinet FortiGate: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Fortinet FortiGate...
Sophos Anti-Virus: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Sophos Anti-Virus...
Symantec Antivirus: bypassing via CAB, CHM, ELF, EXE, Office, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Symantec Antivirus...
Panda Antivirus: bypassing via CAB, ELF, EXE, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by Panda Antivirus...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 330 331 332 333 334 335 336 337 338 340 342 343 344 345 346 347 348 349 350 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021