The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
phpMyAdmin: several vulnerabilities
Several vulnerabilities of phpMyAdmin permit an attacker to conduct a Cross Site Scripting attack or to include external scripts...
PHP: several vulnerabilities
Three vulnerabilities of PHP permit an attacker to conduct a Cross Site Scripting attack, or to alter script execution...
AIX: buffer overflow of chcons
A local attacker could increase his privileges using chcons...
Gallery: obtaining administrative privilege
An attacker having an account can obtain administrative privileges with Gallery...
chmlib: buffer overflow of _chm_find_in_PMGL
An attacker can create a malicious CHM file leading to code execution in chmlib...
Linux kernel: denial of service of ioremap
On a x86_64, a local attacker can conduct a denial of service or read memory using ioremap()...
Linux kernel: denial of service of ebtables
In some cases, an attacker can send packets leading to an error in ebtable...
Mantis: PHP code execution with t_core_path
A network attacker can use t_core_path parameter to inject PHP code in Mantis...
PAM, SELinux: brute force attack with unix_chkpwd
A local attacker can use unix_chkpwd to conduct a brute force attack on user passwords...
uim: privilege increase
A local attacker can use a program linked to uim in order to obtain root privileges...
Ethereal: infinite loop in IRC
An attacker can send a malicious IRC packet in order to conduct a denial of service of Ethereal...
RSA ACE Web Agent: Cross Site Scripting
An attacker can conduct a Cross Site Scripting using RSA ACE Web Agent...
GNOME Data Access: format string attacks
An attacker can conduct two format string attacks in GNOME Data Access logging code...
sudo: privilege increase with SHELLOPTS and PS4
An attacker, allowed to run sudo, can increase his privileges by setting SHELLOPTS and PS4 variables...
Antivirus: bypassing using "magic bytes"
An attacker can construct a file starting with special magic bytes in order to bypass antivirus...
SUSE: file reading with chkstat
A local attacker can read a protected file content after chkstat usage...
fetchmail: password disclosure in fetchmailconf
A local attacker can obtain a copy of configuration file during fetchmailconf usage...
PHP: denial of service with session.save_path
A local attacker can redefine session.save_path value in order to stop Apache...
Eric: code execution with a project
An attacker can create a malicious project leading to code execution when Eric opens it...
Linux kernel: denial of service of IPv6
A local attacker can generate an infinite loop using IPv6 packets...
Linux kernel: information disclosure with DRM
A local attacker can activate DRM debugging in order to obtain sensitive information...
Debian: file corruption with module-assistant
A local attacker can alter a file during module-assistant usage...
Symantec Norton AntiVirus: privilege escalation
Under Macintosh, a local attacker can obtain root privileges with Symantec Norton AntiVirus...
Ethereal: several vulnerabilities
Several vulnerabilities of Ethereal permit a remote attacker to conduct a denial of service or to run code...
Cisco CSS: denial of service with a certificate
An attacker can send a malicious client certificate in order to stop Cisco 11500 Content Services Switch...
Squid: denial of service of FTP
An attacker can setup a malicious FTP server, stopping Squid proxies connecting to it...
RSA SecurID Web Agent: buffer overflow of IISWebAgentIF.dll
An attacker can conduct an overflow in IISWebAgentIF.dll in order to run code on server...
HP-UX: buffer overflow of lpd
An attacker can send a malicious request in order to run code on lpd...
HP-UX: directory listing with ftpd
A non authenticated attacker can list a ftpd directory...

   

Direct access to page 1 21 41 61 81 101 121 124 125 126 127 128 129 130 131 132 134 136 137 138 139 140 141 142 143 144 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1012