The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: infinite loop of __find_get_block_slow
A local attacker can mount a malicious NTFS image to generate a denial of service...
Linux kernel: denial of service of init_journal
A local attacker can mount a malicious GFS2 image to generate a denial of service...
Linux kernel: infinite loop of minix_bmap
A local attacker can mount a malicious minix image to generate a denial of service...
IE: memory corruption via the AcroPDF ActiveX
A vulnerability of the AcroPDF ActiveX leads to code execution on user's computer...
ImageMagick: vulnerabilities via a SGI image
An attacker can create a malicious SGI image leading to a denial of service or to code execution on computers of ImageMagick users...
ProFTPD: overflow of sreplace, vd_proftpd.pm
The vd_proftpd.pm Metasploit module exploits two overflows of the sreplace() function of ProFTPD...
Apache: overflow of mod_auth_kerb
An overflow of 4 bytes can occur in mod_auth_kerb...
Novell Client: buffer overflow of NWSPOOL.DLL
Two vulnerabilities of NWSPOOL.DLL permit a RPC attacker to execute code on computer...
linux-ftpd, netkit: directory change as root
After authentication, the current directory of user is changed with root rights...
flexbackup: file corruption
A local attacker can alter a file during flexbackup usage...
Avahi: information edition via netlink
A local attacker can send malicious netlink messages to Avahi in order to alter returned information...
OpenBSD: vulnerability of ld.so
A local attacker could use a vulnerability of ld.so...
WebSphere AS 6.1.0: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to attack the service...
libpng: denial of service of png_set_sPLT
An error of the png_set_sPLT() function permits an attacker to stop the program when a malicious PNG image is opened...
phpMyAdmin: several Cross Site Scripting
An attacker can use several PHP pages in order to inject HTML code in phpMyAdmin...
Asterisk: code execution and denial of service
Two vulnerabilities of Asterisk permit a remote attacker to execute code or to generate a denial of service...
FreeBSD: kernel memory disclosure via FireWire
A local attacker can use a FireWire ioctl in order to read parts of kernel memory...
JDK, JRE: access to data of other applets
A malicious Java applet can access to data of other applets...
IE: memory corruption via the WinZip ActiveX FilePattern
A vulnerability of the WZFILEVIEW ActiveX leads to code execution on user's computer...
Links: file transfer via smbclient
An attacker can transfer files with the computer of Links' users...
PowerDNS: buffer overflow via TCP
An attacker can execute code on PowerDNS when it is configured as recursive...
Linux kernel: denial of service of superblock_doinit
A local attacker can mount a malicious HFS image to generate a denial of service when SELinux is activated...
Windows: memory corruption of the Workstation service
An attacker can send a RPC request to the Workstation service in order to execute code on computer...
Microsoft Agent: memory corruption via ACF
An attacker can create a malicious ACF file leading to code execution in Microsoft Agent...
Windows: buffer overflow of Client Service for NetWare
When Client Service for NetWare is active, an attacker can send packets to overflow a buffer, then to lead to code execution or to a denial of service...
Internet Explorer: several vulnerabilities
Several vulnerabilities of Internet Explorer permit a remote attacker to execute code on user's computer...
AVG: several vulnerabilities
Several vulnerabilities of AVG antivirus permit a remote attacker to generate a denial of service or to execute code...
Tru64 UNIX: buffer overflow of PTHREAD_CONFIG
A local attacker can use suid/sgid programs linked with libpthread in order to elevate his privileges...
Trac: Cross Site Request Forgery
An attacker can invite administrator to click on a link in order to carry out administrative tasks on Trac...
SAP: several vulnerabilities
An attacker can use several vulnerabilities against old versions of SAP...

   

Direct access to page 1 21 41 61 81 101 121 141 158 159 160 161 162 163 164 165 166 168 170 171 172 173 174 175 176 177 178 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1012