The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linuk Kernel: several denials of service
The 2.6.15.1 version of the linux kernel corrects three vulnerabilities which permits to lead to a denial of service of the machine...
Networker: several vulnerabilities
Three vulnerabilities have been discovered on networker. The first one permits to realize a denial of service, and the other two permit to run code...
Thunderbird: attached file type spoofing
It is possible to trick user by spoofing the file extension of an attached file...
antiword: symlink attack
The use of temporary files in antiword permits symlink attack...
Wine: code execution exploiting WMF files vulnerability
It is possible to exploit the WMF files vulnerability discovered for Windows to run code on the machine using wine...
Mantis: several vulnerabilities
The version 0.19.4 of Mantis corrects several vulnerabilities...
Sun Solaris: data suppression and denial of service of lpsched
A local unprivileged user have the ability to delete any file or disable the LP print service on a system configured as a print server...
albatross: arbitrary code execution supplied by user via a template
A design error permits a user to make a template execute code...
net-snmp: write access granted to read-only users
Read-only users or communities which were configured using the "rocommunity" or "rouser" snmpd.conf tokens can grant access to write access rights...
Tuxpaint: symlink attack
The use in Tuxpaint of temporary files with predictable name in the "/tmp" folder permits symlink attack...
Open Enterprise Server: heap memory corruption on httpstkd (Novel Remote Manager)
By sending a huge or negative size via a HTTP request header to httpstkd it is possible to corrupt heap memory and so potentially execute code...
PHP 5: session extension vulnerable to response splitting attacks and cross site scripting
Lacks in PHP 5 session managing permit an attacker to use response splitting attacks and cross site scripting...
PHP 5: format string vulnerability in the exception handling of mysqli
The use of exceptions in error reporting of mysqli without control on format string permits an attacker to run code on the machine using mysqli...
Solaris: root access gaining and denial of service
A local unprivileged user may have the ability to gain root access or panic the Solaris operating system...
Solaris: denial of service using find function
A local user can cause a denial of service of the machine by carrying a research with find on "/proc"...
Struts: error message cross site scripting
The generated error message of struts does not perform sufficient controls and permits an attacker to lead to code execution by the user's browser via cross site scripting...
FreeBSD: denial of service of ipfw using ip fragments
In some ipfw configurations, an attacker can send an IP fragment in order to stop the firewall...
FreeBSD: file corruption with ee
A local attacker can alter a file during ee usage...
Windows: buffer overflow of Embedded Web Fonts
When a web page is displayed or when a HTML e-mail is received, a font can be automatically downloaded and can lead to code execution...
Outlook, Exchange: code execution with TNEF
An attacker can send an email in TNEF format in order to run code with rights of user opening it with Outlook, or on an Exchange server...
Windows: denial of service with a WMF file
Displaying a malicious WMF file leads to software stop...
auth_ldap: multiple format string vulnerabilities
Because of an incorrect use of the ap_log_rerror() function of Apache, it is possible for an attacker to run code on the server using auth_ldap...
ClamAV: buffer overflow of UPX
An attacker can create a malicious UPX program in order to run code on ClamAV...
Solaris: vulnerabilities of uucp and uustat
Several vulnerabilities of uucp and uustat permit a local attacker to run code with uucp user rights...

   

Direct access to page 1 21 41 61 81 101 121 131 132 133 134 135 136 137 138 139 141 143 144 145 146 147 148 149 150 151 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022