The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
2 Samba: ACL removed via smbcacls
In some situations, the smbcacls command of Samba can delete ACLs, so an attacker can access to file which were previously protected...
2 Samba: brute force via SAMR
An attacker can use SAMR to exploit a brute force, in order to guess the password of a Samba user...
2 Windows: brute force via SAMR
An attacker can use SAMR to exploit a brute force, in order to guess the password of a Windows user...
2 Windows: two vulnerabilities of Win32k
An attacker can use several vulnerabilities of Win32k of Windows...
2 Microsoft Silverlight: bypassing ASLR/DEP
An attacker can use Microsoft Silverlight, in order to bypass ASLR/DEP to exploit another vulnerability...
4 Windows: memory corruption via DirectShow JPEG
An attacker can invite the victim to open a malicious JPEG image, in order to execute code on his computer...
4 Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
2 Adobe Flash Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
2 WordPress LayerSlider: Cross Site Request Forgery
An attacker can trigger a Cross Site Request Forgery of WordPress LayerSlider, in order to force the victim to perform operations...
2 HP-UX: denial of service via NFS rpc.lockd
An attacker can send a malicious query to the NFS rpc.lockd daemon of HP-UX, in order to trigger a denial of service...
2 Asterisk: multiple vulnerabilities
An attacker can use several vulnerabilities of Asterisk...
2 Squid: denial of service via ssl_dump
An attacker can send an HTTP+SSL query with the Range header to a Squid proxy configured with ssl_bump, in order to stop it...
1 Linux kernel: information disclosure via Segmentation Zerocopy
A local attacker can use fragmented data, in order to obtain memory areas from the Linux kernel memory...
3 FreeType: buffer overflow of cf2_hintmap_build
An attacker can generate a buffer overflow in the cf2_hintmap_build() function of FreeType, in order to trigger a denial of service, and possibly to execute code...
2 Joomla plg_content_codehighlighter: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla plg_content_codehighlighter, in order to execute JavaScript code in the context of the web site...
2 Joomla plg_highlight_button: SQL injection
An attacker can use a SQL injection of Joomla plg_highlight_button, in order to read or alter data...
2 Joomla plg_highlight_content: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla plg_highlight_content, in order to execute JavaScript code in the context of the web site...
2 Linux kernel: denial of service via ICMPv6 Router Advertisement
An attacker can send numerous ICMPv6 Router Advertisement packets, in order to fill the kernel memory, to trigger a denial of service...
2 Check Point Security Gateway: HTTP evasion
An attacker can flow malicious HTTP data through the Check Point Security Gateway, in order to bypass security features...
2 Wireshark: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
2 Joomla Core: privilege escalation via GMail
An attacker can use the GMail authentication on Joomla Core, in order to escalate his privileges...
2 Joomla Core: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Core, in order to execute JavaScript code in the context of the web site...
2 Joomla Core: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Joomla Core, in order to execute JavaScript code in the context of the web site...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 427 428 429 430 431 432 433 434 435 437 439 440 441 442 443 444 445 446 447 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 996