The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Affix: command execution
An attacker can execute commands during PIN Helper call to access a Bluetooth device...
HP ProLiant DL585: remote access to computer
When a HP ProLiant DL585 server is powered down, a network attacker can access it...
Apache: incorrect enforcement of SSLVerifyClient directive
In special cases, directive "SSLVerifyClient require" is not enforced...
OpenSSH: 2 vulnerabilities
On some configurations, an attacker can connect to forwarded ports or obtain GSSAPI credentials...
Linux kernel: denials of service of zlib
A local attacker can create 3 denials of service using compressed data...
SqWebMail: Cross Site Scripting with an attached file
An attacker can create an email with a malicious attached file in order to do a Cross Site Scripting attack...
Windows: non display of firewall exceptions
A local privileged attacker can create values in registry in order to mask exception messages...
Netware: denial of service of CIFS.NLM
A network attacker can use a long password in order to stop service...
pstotext: code execution through GhostScript
When pstotext is called on a malicious Postscript file, code can be run with user's rights...
phpLDAPadmin: file reading and code execution
An attacker can use welcome.php script of phpLDAPadmin to read files or execute PHP or shell commands...
phpLDAPadmin: anonymous access to LDAP server
An attacker can use phpLDAPadmin to access LDAP server...
maildrop: obtaining mail group privileges
A local attacker can obtain mail group privileges by using lockmail command of maildrop...
xntpd: daemon starting with a privileged group
When "-u" option is used, daemon can start with a privileged group...
Kismet: several vulnerabilities
Several vulnerabilities of Kismet permit a network attacker to execute code...
Linux kernel: denial of service by creating IPSec policies
A local attacker can create IPSec policies in order to conduct a denial of service...
Sophos AV: buffer overflow with a Visio file
An attacker can create a malicious Visio file leading to code execution on antivirus...
backup-manager: 2 vulnerabilities
A local attacker can access to saved data and corrupt files with backup-manager...
simpleproxy: format string attack
An attacker, with access to a web server, can conduct a format string attack in simpleproxy...
Gallery: Cross Site Scripting of an image with EXIF
An attacker can create a malicious image containing EXIF data leading to a Cross Site Scripting attack...
Lm_sensors: file corruption with a symlink attack
A local attacker can corrupt a system file during pwmconfig execution...
Openview NNM: command execution with connectedNodes.ovpl
An attacker can for example use connectedNodes.ovpl script to run commands with rights of Openview NNM web server user...
Courier: denial of service of SPF
An attacker can generate a DNS error to conduct a denial of service on Courier servers configured with SPF...
PCRE: integer overflow of pcre_compile.c
An attacker can create a malicious regular expression leading to code execution...
HP-UX: file access on VxFS
A local attacker can bypass VxFS filesystem access restrictions...
pam_ldap: authentication bypass with PasswordPolicyResponseValue
When LDAP server return an incomplete PasswordPolicyResponseValue message, authentication succeeds...
Solaris: code execution on DNS clients
When system is configured as DNS client, a network attacker can run code with root privileges...
IIS: spoofing of SERVER_NAME variable
An attacker can create a malicious HTTP request leading to storage of a bad value in SERVER_NAME variable...
BlueZ: command execution
An attacker can execute commands during PIN Helper call to access a Bluetooth device...
WebLogic Portal: access to entitled pages
An attacker can access pages having an "entitlement" restriction...

   

Direct access to page 1 21 41 61 81 101 119 120 121 122 123 124 125 126 127 129 131 132 133 134 135 136 137 138 139 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022