The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Solaris: file corruption via tip
A local attacker can alter a file with privileges of uucp user by using the tip command...
Bintec X: denial of service of SSH
An attacker may generate a denial of service by connecting to the SSH port...
Windows: buffer overflow of RC files
When Microsoft Visual Studio is installed, opening a RC file can lead to code execution...
Solaris: vulnerability of kcms_calibrate
A local attacker can exploit a vulnerability of kcms_calibrate in order to execute code with root privileges...
VLC, xine: format string attack via udp
An attacker can use an udp uri in order to generate a format string attack on user's computer...
Bluetooth: denial of service via OBEX PUSH
An attacker can send numerous OBEX PUSH queries in order to block Bluetooth devices...
Windows: buffer overflow of HPJ files
When Microsoft Visual Studio or Microsoft Help Workshop is installed, opening a HPJ file can lead to code execution...
Netrik: command execution
An attacker can create a website containing a form with a special name in order to execute code on computer of victim using Netrik...
libgtop: overflow in glibtop_get_proc_map_s
A local attacker can generate an overflow in glibtop_get_proc_map_s() in order to elevate his privileges...
Windows: buffer overflow of CNT files
When Microsoft Visual Studio or Microsoft Help Workshop is installed, opening a CNT file can lead to code execution...
HP-UX: denial of service of IPFilter
When the PHNE_34474 patch is installed, a remote attacker can generate a denial of service on IPFilter...
GNU ed: file corruption
A local attacker can alter a file during GNU ed usage...
WebLogic: several vulnerabilities
An attacker can exploit several vulnerabilities of WebLogic Server and Express...
Java SDK/JRE/JDK: memory corruption via a GIF image
An attacker can create a Java applet loading a special GIF image in order to execute code on victim's computer...
Oracle AS: several vulnerabilities of January 2007
Several vulnerabilities are corrected by CPU of January 2007...
Oracle Database: several vulnerabilities of January 2007
Several vulnerabilities are corrected by CPU of January 2007...
Squid-Cache: denial of service via FTP
An attacker can request a particular FTP uri in order to stop Squid-Cache...
WebSphere AS 6.1.0: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to attack the service...
NetBSD, OpenBSD: denial of service via ICMPv6
An attacker can generate an infinite loop by sending an ICMPv6 packet of Echo Request type...
Outpost Firewall: altering via ZwSetInformationFile
A local attacker can corrupt installation of Outpost Firewall via ZwSetInformationFile()...
Bluez: character injections via hidd
An attacker can inject keyboard or mouse events in hidd...
libsoup: denial of service via a GET
An attacker can use a malformed query in order to generate a denial of service on softwares compiled with libsoup...
Snort: altering log file via GRE
An attacker can send a malicious GRE packet in order to force Snort to log a fragment of memory content...
neon: denial of service via an uri
When the ne_uri_parse() function of libneon library analyzes an uri containing non ASCII7 characters, an error occurs...
Cacti: command injections
An attacker can inject SQL and shell commands via the cmd.php and copy_cacti_user.php scripts of Cacti...
slocate: filename disclosure
A local attacker can use slocate to obtain name of files located in unreadable directories...
FreeBSD: file access via the jail rc.d script
A local attacker can access filesystem by having modified files in a jail setup by the jail rc.d script...
Snort: denial of service during analyze
An attacker can create some complex packets in order to slow Snort, which miss some intrusions...
OpenView NNM: code execution
A remote attacker can execute code on server using a vulnerability of HP OpenView Network Node Manager...
OpenView NNM: reading files
A remote attacker can read files using a vulnerability of HP OpenView Network Node Manager...

   

Direct access to page 1 21 41 61 81 101 121 141 161 163 164 165 166 167 168 169 170 171 173 175 176 177 178 179 180 181 182 183 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1047