The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Firefox, Thunderbird, SeaMonkey: several vulnerabilities
Several vulnerabilities were announced in Firefox, Thunderbird and SeaMonkey, the worst one leading to code execution...
F-Secure: buffer overflow of web console
An attacker can generate a buffer overflow on web console, before authentication...
FreeBSD: bypassing access restrictions to ypserv
An attacker can access to ypserv even if its IP address is not in securenets...
SuSE: man in the middle attack on rug of RedCarpet
An attacker can use a man in the middle attack to capture data or to administer a system via RedCarpet...
MySQL: SQL injection via multi-byte characters
An attacker can inject SQL code using multi-byte characters...
Snort: bypassing http_inspect
An attacker can use special queries destined to Apache web server, which are not detected by Snort...
Linux kernel: information disclosure via getsockopt
A local attacker can use the getsockopt() function to obtain memory fragments...
ktools: buffer overflow of VGETSTRING
An attacker can use long parameters in order to generate an overflow in ktools...
Linux kernel: denial of service in choose_new_parent
A local attacker can generate an error in choose_new_parent() in order to stop system...
Linux kernel: denial of service via lsof
A local attacker can stop system by calling lsof...
Linux kernel: restriction bypass with readv and writev
A local attacker can use readv() and writev() to bypass LSM restrictions...
Vixie cron: privilege elevation in do_command.c
A local attacker can generate an error in do_command.c in order to run a command with root privileges...
Drupal: code execution and SQL injection
An attacker can use two vulnerabilities against Drupal...
Mandriva: incorrect permissions on mailboxes created by useradd
In some cases, the useradd command creates user mailboxes with incorrect permissions...
libtiff: buffer overflow of tiffsplit
An attacker can use a long prefix in order to generate an overflow in tiffsplit...
mpg123: stack overflow of III_i_stereo
An attacker can create a malformed audio file leading to an overflow in III_i_stereo() function...
libextractor: overflow via ASF, QT, MOV
An attacker can create malicious ASF, QT or MOV documents leading to code execution with rights of application using libextractor...
ImageMagick: overflow of DisplayImageCommand
An attacker can generate an overflow in the DisplayImageCommand() function...
Dovecot: information disclosure
An attacker having an IMAP account can obtain some information via Dovecot...
Dia: format string attacks
An attacker can create a malicious DIA file in order to generate format attacks which may lead to code execution...
PHP: file reading with cURL
A local attacker can use cURL functions to read files by bypassing safe mode restrictions...
AWStats: command execution with configdir
An attacker can use a special configdir parameter in order to execute a shell command on server...
Symantec AV: buffer overflow of remote management interface
An attacker can generate an overflow in Symantec Client Security and Symantec AntiVirus Corporate Edition...
Cisco VPN Client: privilege elevation
Under Windows, a local attacker can use the VPN client to obtain LocalSystem privileges...
AIX: privilege elevation via lsmcode and update_flash
A local attacker can use lsmcode and update_flash to obtain root rights...
PostgreSQL: SQL injection via multi-byte characters
An attacker can inject SQL code using multi-byte characters...
HP-UX: privilege elevation using Software Distributor
A local attacker can elevate his privileges using Software Distributor...
Kaspersky AV: bypassing HTTP monitor
A local attacker can bypass the HTTP monitor by using a special request...
HP OpenView Storage Data Protector: code execution
An attacker can execute code on HP OpenView Storage Data Protector...

   

Direct access to page 1 21 41 61 81 101 121 141 143 144 145 146 147 148 149 150 151 153 155 156 157 158 159 160 161 162 163 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1022