The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
SAP IGS: undocumented features
An attacker can use undocumented features of SAP IGS in order to stop service, to access configuration files or to perform unauthorized actions...
Word: code execution 1
An attacker can create a malicious Word document leading to code execution when it is opened...
Novell Client: denial of service of srvloc.sys
An attacker can send a malicious packet in order to stop the service...
Novell Client: buffer overflow of NDPPNT.DLL
An attacker can generate an overflow in NDPPNT.DLL...
Outpost Firewall: bypassing protection
A local attacker can use a DLL injection in order to bypass Outpost Firewall protection, then to deactivate it...
Novell Client: format string attack of NMAS
A network attacker can generate a format string attack via NMAS...
Windows: denial of service of GetPrinterData
A network attacker can use a RPC request calling GetPrinterData() in order to use a large amount of memory...
F-Prot: vulnerabilities of ACE and CHM under Unix
An attacker can generate a denial of service and an overflow of F-Prot under Unix...
xine-lib: overflow of Real Media plugin
An attacker can create a malicious Real Media document generating an overflow in xine applications...
SquirrelMail: several vulnerabilities
Several Cross Site Scripting or interpretation errors of Internet Explorer have been found in SquirrelMail...
KDE: denial of service of kfile-info
An attacker can create a malicious JPEG image in order to stop processes using the kfile-info plugin...
Sun Java System Proxy Server: data injection
Sun Java System Proxy Server proxy does not correctly manage requests containing Transfer-Encoding and Content-Length headers...
Solaris: denial of service via SIGKILL
A local attacker can use SIGKILL to create an atomicity error to panic system...
KOffice: memory corruption with a PowerPoint document
An attacker can create a malicious PowerPoint document in order to corrupt memory of KLaola library...
libgsf: memory corruption via metabat
An attacker can create a malicious OLE2 document in order to execute code on computer of users opening it with a program linked with libgsf...
Linux kernel: integer overflow of get_fdb_entries
A local attacker can use a ioctl on a bridge in order to generate a memory corruption...
Kronolith: file inclusion
An attacker can give a view as parameter of a script in order to include a file...
tar: creating files outside extraction directory
An attacker can create a tar file containing a GNUTYPE_NAMES block, in order to force creation of files outside extraction directory...
NetBSD: several denials of service
A local attacker can generate three denials of service...
NetBSD: information leak
A local attacker can exploit two vulnerabilities in order to obtain sensitive information...
ProFTPD: buffer overflow of mod_tls
An attacker can use a malicious certificate in order to generate an overflow in ProFTPD...
JBoss AS: file access via DeploymentFileRepository
An attacker can use applications containing the DeploymentFileRepository class in order to read or alter files...
GnuPG: buffer overflow when a file is opened
An overflow can occur in GnuPG used in interactive mode to open a malicious file...
Linux kernel: memory corruption of ReiserFS via set_sb_syncing
A local attacker can mount a malicious ReiserFS image to generate a denial of service or to execute code...
GNU Radius: format string attack via sqllog
An attacker can send malicious RADIUS data in order to generate a format string attack when they are logged...
BSD: no deactivation of LD_PRELOAD
A call to setuid() in some suid/sgid programs keeps the LD_PRELOAD environment variable activated...
Firefox, Seamonkey, Netscape: auto-filling of password
An attacker, allowed to store HTML code on a website, can obtain users' passwords via the auto-filling feature...

   

Direct access to page 1 21 41 61 81 101 121 141 159 160 161 162 163 164 165 166 167 169 171 172 173 174 175 176 177 178 179 181 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1053