The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
AIX: vulnerability of umountall
The umountall command has a vulnerability...
HP-UX: remote unauthorized access using IPSec
A remote attacker can access system using IPSec...
Xpdf, gpdf, cups: several overflows
An attacker can create a malicious PDF document leading to code execution on computer of users opening it with Xpdf, or its derivatives...
IMP: several Cross Site Scripting
An attacker can send malicious HTML emails in order to conduct Cross Site Scripting attacks...
Linux kernel: memory leak of VFS
A local attacker can cause a memory leak in fasync_helper() of VFS...
Linux kernel: denial of service using IPv6 flow label
A local attacker can create a socket using a flow label in order to corrupt memory or to conduct a denial of service...
Linux kernel: denial of service in locking of POSIX timers
On a multi-processor computer, a local attacker can lock system using POSIX timers...
Linux kernel: denial of service with ptrace and auto-reap
The auto-reap feature also select ptrace attached processes, which leads to system stop...
Linux kernel: denial of service of ptrace with CLONE_THREAD
A local attacker can use ptrace to stop system...
Linux kernel: denial of service of do_coredump
A local attacker can conduct a denial of service by generating a core dump...
Sun Application Server: man in the middle attack on Proxy Plug-in
An attacker can conduct a "man in the middle" attack on the SSL Proxy Plug-in in order to obtain sensitive information...
Apache: interpretation of files with several extensions
Files with several extensions, such as ".php.old" are interpreted, which can differ for expected configuration...
Mailman: denial of service of Scrubber.py
An attacker can send a message containing an attachment with an invalid filename in order to stop Mailman...
IE: information disclosure with Cascading Style Sheets
An attacker can use a page containing Cascading Style Sheets in order to bypass domain restrictions...
PHP: header injection with mb_send_mail
An attacker can use recipient address of smb_send_mail() function to inject additional headers in the message...
PHP: security bypass with virtual
A local attacker can use virtual() function to bypass safe_mode and open_basedir directives...
Open Motif: buffer overflow of libUil
An attacker can generate two overflows in libUil library of Open Motif...
Linux kernel: denial of service in vlan_dev.c
An error occurs during SIOCSMIIREG ioctl usage invlan_dev.c...
Linux kernel: memory fragment reading with sys_get_thread_area
The sys_get_thread_area() function does not correctly initialize memory before returning it to user...
Linux kernel: denial of service in NAT code
When two packets are translated at the same time, kernel can stop...
Linux kernel: denial of service of ip_vs_conn_flush
On a multi-processors computer, a local attacker can generate an error in ip_vs_conn_flush() function leading to system stop...
PERL: integer overflow with a format string
An integer overflow occurs in PERL interpreter when a malicious format string is used...
Linux kernel: denial of service with POSIX timers
A local attacker can conduct a denial of service using POSIX timers...
Linux kernel: changing console keys mapping
A local attacker can change console keyboard configuration in order to run shell commands with the rights of the next console users...
Linux kernel: memory leak of seq_file
A memory leak of seq_file permits a local attacker to conduct a denial of service...
Gallery: several vulnerabilities
Three vulnerabilities of Gallery permit an attacker to obtain information, to conduct a Cross Site Scripting attack or to read files...
netpbm: several overflows of pnmtopng
When pnmtopng is called on a malicious PNM file, code can be run with user's rights...
pcAnywhere: denial of service with a buffer overflow
A network attacker can generate an overflow leading to pcAnywhere stop...

   

Direct access to page 1 21 41 61 81 101 121 127 128 129 130 131 132 133 134 135 137 139 140 141 142 143 144 145 146 147 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1011