The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: buffer overflow of vhost-net handle_rx
An attacker, privileged in a guest system, can generate a buffer overflow in the handle_rx() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code...
Linux kernel: denial of service via vhost-net get_rx_bufs
An attacker, located in a guest system, can generate a network error in vhost-net of the Linux kernel, in order to trigger a denial of service...
FreeBSD: denial of service via NFS Server
An attacker can rename a directory on a NFS share of FreeBSD, in order to trigger a denial of service...
Microsoft Publisher: memory corruption via pubconv.dll
An attacker can invite the victim to open a malicious Publisher file, to generate a memory corruption in pubconv.dll of Microsoft Publisher, in order to trigger a denial of service, and possibly to execute code...
Windows: code execution via BAT/CMD
An attacker can invite the victim to open a remote BAT/CMD file on Windows, in order to execute code...
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
Office, Word: two vulnerabilities
An attacker can use several vulnerabilities of Office, Word...
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
Linux kernel: denial of service via cma_req_handler
An attacker can send an InfiniBand RDMA packet, in order to generate an error in the cma_req_handler() function of the Linux kernel, in order to trigger a denial of service...
WebSphere MQ 7.0: multiple vulnerabilities
An attacker can use several vulnerabilities of WebSphere MQ...
SAP Router: password disclosure via Brute Force
An attacker can use a brute force on SAP Router, in order to progressively obtain the password...
Linux kernel: denial of service via KVM ioapic_service
An attacker, located in a KVM guest, can use the KVM I/O APIC of the Linux kernel, in order to trigger a denial of service...
OpenSSL: information disclosure via Heartbeat
An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory...
Cisco Unity Connection: directory traversal
An attacker can traverse directories of Cisco Unity Connection, in order to read a file outside the service root path...
Cisco IOS XR: denial of service via ICMPv6 Redirect
An attacker can send ICMPv6 Redirect packets to Cisco IOS XR, in order to trigger a denial of service of IPv4 and IPv6 streams...
McAfee Application Control: privilege escalation
A local privileged attacker can bypass McAfee Application Control, in order to escalate his privileges...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 432 433 434 435 436 437 438 439 440 442 444 445 446 447 448 449 450 451 452 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1081 1101 1113