The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PostgreSQL: 3 denials of service
An authenticated attacker can stop PostgreSQL by using 3 vulnerabilities...
Sun Java System Messaging: Cross Site Scripting of Webmail
An attacker can execute Javascript code in the browser of a user, by using a malicious email...
Symantec: privilege elevation via SAVRT.SYS
A local attacker can obtain system privileges with several Symantec products using SAVRT.SYS...
Linux kernel: information disclosure via __block_prepare_write
An error in the __block_prepare_write() function permits a local attacker to obtain data coming from an unlinked file...
Drupal: several vulnerabilities
An attacker can obtain information or execute a script with privileges of Drupal's users...
Kaspersky AV: privilege elevation via KLIN.SYS and KLICK.SYS
A local attacker can obtain system privileges with Kaspersky Labs Anti-Virus using KLIN.SYS or KLICK.SYS...
Linux kernel: denial of service via shm on SMP
On a multi-processor computer, a local attacker can use shmat() and shmctl() to block the system...
Mutt: file altering or reading
A local attacker can alter or read files during Mutt usage...
Lotus Notes: incorrect permissions on the installation directory
Access permissions to the installation directory of the Lotus Note client permit all local users to alter the program...
KDE khtml, Qt: integer overflow
An attacker can create a malicious pixmap image leading to an overflow in KDE khtml / Qt...
Solaris: denial of service of TCP Fusion
A local attacker can generate a denial of service on servers where the TCP fusion is activated...
libksba: denial of service
An attacker can create a malicious X.509 certificate in order to stop programs linked with libksba...
Adobe Flash Player: HTTP header injection
An attacker can use the Flash Player plugin in order to send special HTTP queries to a web server...
Tru64 UNIX, HPUX: privilege elevation via dtmail
A local attacker can use an overflow of the dtmail program in order to obtain privileges of the mail group...
Oracle AS: several vulnerabilities of October 2006
Several vulnerabilities are corrected by CPU of October 2006...
Oracle Database: several vulnerabilities of October 2006
Several vulnerabilities are corrected by CPU of October 2006...
Linux: reading memory fragments on s390
On a s390 processor, a local attacker can read an uninitialized kernel memory area...
ClamAV: 2 vulnerabilities
Two vulnerabilities of Clam AntiVirus permit an attacker to generate a denial of service or to execute code...
Apache: format string attack of mod_tcl
An attacker can cause a format string attack in mod_tcl in order to execute code on server...
FreeBSD: denial of service via sched_setscheduler
A local attacker can use the sched_setscheduler() function in order to generate a denial of service...
FreeBSD: denial of service via ftruncate
A local attacker can use the ftruncate() function in order to stop system...
PowerPoint: code execution
An attacker can create a malicious PowerPoint document leading to code execution when it is opened...
NSPR: file corruption
A local attacker can alter a file with rights of a suid/sgid application linked to NSPR...
FreeBSD: denial of service via ptrace PT_LWPINFO
A local attacker can use the PT_LWPINFO request of ptrace() in order to stop system...
WebSphere AS 6.1.0: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to obtain information or to attack the service...
Linux kernel: denial of service of lockd
A malicious NFS client can stop the service...
Windows Object Packager: code exécution
An attacker can create a malicious document, invite user to open it and to click twice, in order to execute code on his computer...
Windows: vulnerability of SMB Rename
An authenticated attacker can send a malicious SMB packet in order to generate a denial of service or to execute code on system...
Microsoft XML Core Services: two vulnerabilities
Two vulnerabilities of Microsoft XML Core Services permit an attacker to execute code or obtain information...

   

Direct access to page 1 21 41 61 81 101 121 141 155 156 157 158 159 160 161 162 163 165 167 168 169 170 171 172 173 174 175 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1047