The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
VMware vCenter Chargeback Manager: code execution
A remote attacker can use a vulnerability of VMware vCenter Chargeback Manager, in order to execute code...
Adobe Flash Player: memory corruption
An attacker can generate a memory corruption in Adobe Flash Player, in order to trigger a denial of service, and possibly to execute code...
Microsoft Office: memory corruption via PNG
An attacker can invite the victim to open with Microsoft Office a document containing a malicious PNG image, to generate a memory corruption, in order to trigger a denial of service, and possibly to execute code...
Windows: use after free via Print Spooler
An attacker can use a freed memory area in the Print Spooler of Windows, in order to trigger a denial of service, and possibly to execute privileged code...
Windows: integer overflow of TCP/IP
An attacker can generate an integer overflow in TCP/IP of Windows, in order to trigger a denial of service, and possibly to execute code...
Windows: information disclosure on kernel memory
A local attacker can trigger an error in the Windows kernel, in order to obtain sensitive information...
Internet Explorer: multiple vulnerabilities
An attacker can invite the victim to display a malicious site with Internet Explorer, in order to make his computer execute code...
WordPress WP-SendSMS: multiple vulnerabilities
An attacker can use several vulnerabilities of the plugin WordPress WP-SendSMS...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 379 380 381 382 383 384 385 386 387 389 391 392 393 394 395 396 397 398 399 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013