The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
1 Solaris: privilege elevation using an application linked to libpkcs11
In some cases, a local attacker could elevate his privileges using an application linked to libpkcs11 library...
1 Outlook: sending file via mailto
An attacker can create a mailto uri sending a file as attachment...
1 Ruby: denial of service of HTTP
An attacker can block a HTTP connection in order to block new connections to HTTP module of Ruby...
1 DNS: vulnerabilities of some implementations
Several implementations of DNS protocol are affected by the same vulnerabilities...
2 Firefox: memory corruption via focus
An attacker can create a HTML document using focus() to corrupt memory...
2 Ethereal: several vulnerabilities
Several vulnerabilities of Ethereal permit a remote attacker to conduct a denial of service or to run code...
2 Linux kernel: bypassing protections via a backslash
Using a backslash character in a CIFS file access path, an attacker could bypass some protections...
1 PHP: several vulnerabilities
Several vulnerabilities permit a PHP author to corrupt memory or to conduct denial of services...
2 IE: memory corruption using objects
An attacker can create a HTML document stopping browser and leading to code execution...
2 Blender: code execution
An attacker can create a malicious file or script in order to run code on user's computer...
1 Beagle: code execution with user's rights
A local attacker can use two vulnerabilities of Beagle to run code with rights of another user...
1 GDM: disclosure of ICEauthority cookies
A local attacker can obtain cookies stored in ".ICEauthority" file...
1 CiscoWorks: privilege elevation and Cross Site Scripting
An attacker can user two vulnerabilities of CiscoWorks WLSE to elevate his privileges...
2 Cisco IOS XR: several vulnerabilities of MPLS
An attacker can conduct 3 denials of service using MPLS packets...
1 Lotus Notes: information added in address book
In some cases, incorrect information are added in personal address book...
1 AMD K7/K8 processors: information disclosure during arithmetic operations
Some operating systems, on some AMD processors, permit a local attacker to obtain information during arithmetic operations...
1 Linux kernel: denial of service during multicast route retrieval
A local attacker can request a multicast route in order to stop kernel...
3 Oracle Application Server: vulnerability of April 2006
A vulnerability is corrected by CPU of April 2006...
3 Oracle Database: several vulnerabilities of April 2006
Several vulnerabilities are corrected by CPU of April 2006...
1 Linux kernel: memory corruption via madvise_remove
A local attacker can use madvise_remove() in order to free some memory pages...
1 Linux kernel: memory corruption via mprotect
In some cases, mprotect incorrectly changes permissions on shared memory...
1 Debian: file corruption via fcheck
A local attacker can alter a system file during execution of fcheck...
2 Avast: changing permissions on a file
On a Linux installation, a local attacker can change file permissions via Avast antivirus...
1 AIX: file corruption with rm_mlcache_file
A local attacker can overwrite a file using rm_mlcache_file...
3 Thunderbird 1.0: several vulnerabilities
Several vulnerabilities were announced in Thunderbird 1.0, the worst one leading to code execution...
3 Thunderbird 1.5: several vulnerabilities
Several vulnerabilities were announced in Thunderbird 1.5, the worst one leading to code execution...
1 Solaris: privilege elevation via Sun Java Studio Enterprise
Some programs installed by Sun Java Studio Enterprise can be edited by a local attacker...
4 Firefox 1.5: several vulnerabilities
Several vulnerabilities were announced in Firefox, the worst one leading to code execution...
4 Firefox 1.0: several vulnerabilities
Several vulnerabilities were announced in Firefox, the worst one leading to code execution...
1 NetBSD: memory exhaustion via sysctl
A local attacker can use all system memory via sysctl()...

   

Direct access to page 1 21 41 61 81 101 121 140 141 142 143 144 145 146 147 148 150 152 153 154 155 156 157 158 159 160 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 994