we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of CentOS
CentOS vulnerability: descriptor leak via PoolListAllVolumes
An attacker can create a file descriptor leak in the remoteDispatchStoragePoolListAllVolumes() function of libvirt, in order to trigger a denial of service.
CentOS vulnerability: multiple vulnerabilities
Several Adobe Reader/Acrobat vulnerabilities can be used by an attacker to execute code or to create a denial of service.
CentOS vulnerability: character injection via mod_rewrite
An attacker can use special characters, which are not filtered by mod_rewrite of Apache httpd 2.2, in order to inject them in the log file.
CentOS vulnerability: several vulnerabilities of April 2013
Several vulnerabilities of MySQL are fixed by the CPU of April 2013.
CentOS vulnerability: obtaining Cookies
An attacker can create a site with a domain name matching the end of another site, in order to force cURL to send its cookies.
Display other vulnerabilities of CentOS described by Vigil@nce...
Display information about CentOS:
. Vigil@nce is a service from
Orange Business Services