The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Windows: denials of service of MSDTC
A network attacker can generate two denials of service of MSDTC...
Exchange: memory corruption via vCAL and iCAL
An attacker can create a malicious email leading to a denial of service and eventually to code execution...
WebSphere AS: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to conduct a denial of service or to run code...
WebSphere AS: bypassing authentication on homepage
In some cases, an attacker can access to a page contents without authenticating...
PIX: bypassing WebSense
An attacker can fragments his HTTP requests in order to bypass web filtering of WebSense...
Sophos: code execution with a CAB file
An attacker can create a malicious CAB file leading to code execution on antivirus...
pstotext: code execution via a filename
An attacker can run code on computer of users opening a malicious file with pstotext...
ISA: character insertion in logs via Host header
An attacker can use a special encoding in Host header to insert characters in logs...
Cisco Secure ACS: disclosure of passwords under Windows
An administrator can obtain the key used to cypher passwords of Cisco Secure ACS...
Apache: HTML injection in Expect header
In particular cases, an attacker could inject HTML code in Expect header...
Linux kernel: several denial of service of SCTP
An attacker can stop kernel by sending SCTP packets...
Linux kernel, FreeBSD: exiting a smbfs chroot via a backslash
When an attacker is in a chroot jail on a smbfs filesystem, he can exit...
BusyBox: password generation with a constant salt
The passwd command from BusyBox hashes passwords using always the same salt...
OpenVPN: no authentication for management interface
When administration interface is activated, an attacker can connect without authenticating, because access password is optional...
Nagios: buffer overflow of Content-Length
An attacker can use a malicious HTTP request in order to generate an overflow in CGI scripts of Nagios...
X.Org: buffer overflow of X Render extension
An attacker allowed to connect to X server can generate an overflow in X Render extension...
Linux kernel: infinite loop in netfilter via SCTP
An attacker can create a malicious SCTP packet in order to generate an infinite loop in netfilter...
MySQL: memory reading via COM_TABLE_CONNECT
An attacker can use COM_TABLE_CONNECT packets in order to obtain information...
rsync: buffer overflow of receive_xattr
An attacker can generate an overflow in receive_xattr() function available in xattrs.diff patch...
resmgr: bypassing USB restrictions
An attacker allowed to access an USB device can access all others...
ClamAV: buffer overflow of freshclam
An attacker owning a signature server can generate an overflow on freshclam clients connecting...
MySQL: buffer overflow and memory reading via COM_TABLE_DUMP
An attacker can use COM_TABLE_DUMP packets in order to run code or to obtain information...
PHP: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to conduct a denial of service or to obtain information...
NetBSD: denial of service of audio_write
A local attacker can modify data during audio_write() execution in order to stop system...
LibTIFF: several vulnerabilities
The LibTIFF library contains several vulnerabilities which could lead to code execution...
Sun Directory Server: denial of service of LDAP
An attacker can use big LDAP data in order to conduct a denial of service...
Cisco VPN 3000: denial of service of HTTP service
An attacker can send HTTP packets to HTTP service in order to stop device...
Oracle Database: privilege elevation via DBMS_EXPORT_EXTENSION
A local attacker can use DBMS_EXPORT_EXTENSION package to obtain DBA rights...

   

Direct access to page 1 21 41 61 81 101 121 141 142 143 144 145 146 147 148 149 151 153 154 155 156 157 158 159 160 161 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070