The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 ApacheTop: file corruption
A local attacker can change a file during ApacheTop usage...
1 Linux kernel: denial of service with USB
A local attacker can prematurely end a process using an USB device in order to stop system...
1 Linux kernel: denial of service with sys_set_mempolicy
A local attacker can use sys_set_mempolicy() to stop system...
1 Linux kernel: denials of service on 64 bit computers
A local attacker can use fput or sockfd_put to stop 64 bit computers...
2 Linux kernel: denials of service of ipt_recent
An attacker can conduct two denials of service in ipt_recent...
1 Linux kernel: ACL not applied on ext2 and ext3
An error prevents default ACL from being applied to ext2 and ext3 filesystems...
3 ProZilla: overflow with a link
A malicious HTML document can lead to an overflow in ProZilla...
3 Kaspersky: buffer overflow with a CAB file
An attacker can create a malicious CAB file leading to code execution on antivirus...
1 CFEngine: file corruption
A local attacker can change a file during CFEngine usage...
2 AbiWord: code execution during RTF import
An attacker can create a malicious RTF file, leading to code execution on computers of users opening it with AbiWord...
2 Debian: disclosure of NTLM APS password
A local attacker can read file containing password used by NTLM APS...
1 gtkdiskfree: file corruption
A local attacker can change a file during gtkdiskfree usage...
1 ZoneAlarm: firewall bypassing
A local attacker can use DDE-IPC is order to communicate with an external server...
1 OpenSSH: denial of service with LoginGraceTime
An attacker can wait LoginGraceTime timeout to conduct a denial of service...
2 AIX: buffer overflow of getconf
A local attacker can obtain root privileges with an overflow in getconf...
3 RealPlayer, Helix Player: format string attack
A remote attacker can create a malicious multimedia file in order to run code in RealPlayer or Helix Player...
1 PHP: open_basedir restriction not honored
In some cases, open_basedir directive is not honored...
2 Solaris: obtaining high privileges with Xsun or Xprt
A local attacker can use Xsun or Xprt to obtain root privileges...
2 Qpopper: file creation with poppassd
A local attacker can create a file with root privileges by using poppassd...
1 IE: malicious requests with XmlHttpRequest
An attacker can send malicious requests with XmlHttpRequest...
1 Solaris: denial of service of UFS
A local attacker can hang system by generating an error on an UFS filesystem...
1 MasqMail: obtaining mail privileges
A local attacker can run code or corrupt a file with mail user privileges...
3 Mozilla, Firefox, Thunderbird, Netscape: several vulnerabilities
Several vulnerabilities of Mozilla suite permits a remote attacker to execute code or conduct a denial of service...
3 Webmin, Usermin: authentication bypass
An attacker can access system when "full PAM conversations" is configured on Webmin or Usermin...
1 Solaris: denial of service of tl driver
A local attacker can conduct a denial of service by causing an error in tl driver...
2 Tru64 Unix, HP-UX: denial of service of ftpd
An authorized attacker can conduct a denial of service of ftpd...
3 ClamAV: buffer overflow of UPX and denial of service of FSG
An attacker can create malicious UPX or FSG programs in order to run code or lead to a denial of service...
2 Squid: denial of service by changing authentication type
An attacker can change authentication type in order to stop Squid-cache...

   

Direct access to page 1 21 41 61 81 101 121 122 123 124 125 126 127 128 129 131 133 134 135 136 137 138 139 140 141 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 995