The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
EMC NetWorker Module for Microsoft Applications: two vulnerabilities
An attacker can use two vulnerabilities of EMC NetWorker Module for Microsoft Applications, in order to execute code or to obtain the administrator's password...
Firefox, Thunderbird, SeaMonkey: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to execute code on victim's computer...
SAP NetWeaver: several vulnerabilities of SDM
An attacker can use several vulnerabilities of SAP NetWeaver SDM...
Firefox 16: disclosure of visited url
An attacker can create a malicious web page, in order to obtain the list of url visited by Firefox 16 users...
Symantec Ghost Solution Suite: memory corruption via backup
An attacker can create a malicious backup file, which corrupts the memory when it is opened by Symantec Ghost Solution Suite, in order to execute code...
FreeBSD, NetBSD, Windows: denial of service via ICMPv6 Router Advertisement
An attacker can send numerous ICMPv6 Router Advertisement packets, in order to create a denial of service in several products...
FreeBSD, NetBSD, Windows: denial of service via ICMPv6 Neighbor Solicitation
An attacker can send numerous ICMPv6 Neighbor Solicitation packets, in order to create a denial of service in several products...
Konqueror: use after free
An attacker can invite the victim to display an HTML page with Konqueror, changing the DOM tree in JavaScript, in order to use a freed memory area, which can lead to code execution...
Konqueror: denial of service via NULL
An attacker can invite the victim to display an HTML page with Konqueror, dereferencing a NULL pointer, in order to stop the process...
Konqueror: denial of service via read
An attacker can invite the victim to display an HTML page with Konqueror, reading at an invalid memory address, in order to stop the process...
Konqueror: memory reading
An attacker can invite the victim to display an HTML page with Konqueror, containing a special style sheet, in order to obtain a fragment of the process memory...
Cisco Catalyst 6500, Router 7600: multiple vulnerabilities of FWSM
Several vulnerabilities impact the FWSM module of Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers products...
Cisco ASA, Catalyst 6500 ASASM: multiple vulnerabilities
Several vulnerabilities impact the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module products...
Joomla: Cross Site Scripting via search
An attacker can use the language search component, in order to generate a Cross Site Scripting in Joomla, leading to the execution of JavaScript code in the context of the web site...
Linux kernel: memory reading via UNAME26
An attacker can use the UNAME26 personality, in order to read a fragment of kernel memory...
BIND: denial of service via Additional Records
An attacker can use malicious Additional Resource Records, in order to lockup a BIND server...
Microsoft SQL Server: Cross Site Scripting via SSRS
When SQL Server Reporting Services is installed on Microsoft SQL Server, an attacker can generate a Cross Site Scripting, in order to execute JavaScript code in the context of the web site...
Windows: denial of service via Kerberos
An attacker can use a malicious Kerberos session, in order to restart a Windows server...
Windows: privilege elevation via kernel
A local attacker can use an integer overflow in the kernel, in order to execute code with system privileges...
Microsoft InfoPath, Communicator, Lync, SharePoint: privilege elevation via HTML Sanitization
An attacker can invite the victim to display a malicious HTML document with Microsoft InfoPath, Communicator, Lync or SharePoint, in order to execute JavaScript code with victim's privileges...
Microsoft Works: code execution via Word
An attacker can invite the victim to open a malicious Word file with Microsoft Works, in order to execute code on his computer...
Word: code execution via RTF
An attacker can invite the victim to open a malicious RTF file with Word, in order to execute code on his computer...
Firefox, Thunderbird, SeaMonkey: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to execute code on victim's computer...
phpMyAdmin: two vulnerabilities
An attacker can use two vulnerabilities of phpMyAdmin, in order to execute JavaScript code in the context of the web site...
Adobe Flash Player: multiple vulnerabilities
Several Adobe Flash Player vulnerabilities can be used by an attacker to execute code or to create a denial of service...
SIMATIC S7-1200: Cross Site Scripting
When the web site is enabled on SIMATIC S7-1200, an attacker can generate a Cross Site Scripting, in order to execute code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 349 350 351 352 353 354 355 356 357 359 361 362 363 364 365 366 367 368 369 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1036