The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
LDAP Account Manager: code execution and Cross Site Scripting
An attacker can exploit two vulnerabilities of LDAP Account Manager...
Asterisk: information disclosure via IAX2
An attacker can use a malicious IAX2 message in order to obtain a memory fragment...
PHP: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to conduct a denial of service or to execute code...
WebSphere AS 6.0.2: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to create a denial of service or to attack the service...
Cisco PIX: denial of service of DHCP relay
An attacker can generate a memory leak when several DHCP servers are configured...
Cisco PIX: vulnerabilities of LDAP and VPN
An attacker can bypass LDAP authentication or create a denial of service on a VPN...
xscreensaver: bypassing authentication
When authentication uses a remote server, an attacker can interrupt the network in order to deactivate xscreensaver...
QEMU: several vulnerabilities
Several vulnerabilities of QEMU permit a local attacker to elevate his privileges or to generate a denial of service...
IE: vulnerabilities of several ActiveX of May 2007
Several ActiveX permit a remote attacker to generate a denial of service or to execute code...
ZoneAlarm: memory corruption of vsdatant
A local attacker can corrupt system memory via the vsdatant driver...
vim: three vulnerabilities of modelines
By creating a malicious file, an attacker can execute commands on computer of victims reading it...
Solaris: denial of service during a BSM audit
A local attacker can stop system during BSM audit on a file...
Sun Java System Directory Server: denial of service of LDAP
An attacker can send a malicious LDAP query in order to stop the service...
Java Web Start: privilege elevation via JNLP
A malicious applet can access to local files of victim's computer via Java Web Start...
HP-UX: privilege elevation via HP Power Manager RA
A local attacker can acquire root privileges by exploiting a vulnerability of HP Power Manager Remote Agent...
Bind: denial of service via query_addsoa
An attacker can send two recursive queries in order to stop Bind version 9.4.0...
RHEL 5: denial of service via utrace
A local attacker can stop systems compiled with utrace support...
OpenBSD: denial of service via AltiVec
A local attacker can generate an Assist AltiVec exception in order to stop kernel...
NSS: memory leak via RSA
An attacker can create a denial of service by exploiting a memory leak in NSS...
WebSphere AS 5.1.1: several vulnerabilities
Several vulnerabilities of WebSphere AS permit an attacker to obtain information or to attack the service...
Gimp: buffer overflow via a Sun Raster image
An attacker can create an image containing a high number of colours in order to generate an overflow on computers of Gimp users...
IE, Firefox: request splitting via a Digest authentication
An attacker can create a malicious web site in order to force web browsers of users behind a proxy to inject a new HTTP query...
Linux kernel: denial of service of netlink
A local attacker can create an infinite recursion in netlink, which stops system...
Solaris: denial of service of Sun Cluster
A local attacker can stop sibling Sun Cluster nodes...
Asterisk: several vulnerabilities
Three vulnerabilities of Asterisk permit a remote attacker to generate a denial of service or to execute code...
Aircrack-ng: buffer overflow of airodump-ng
An attacker can send a long 802.11 authentication packet in order to execute code in airodump-ng...
phpMyAdmin: several Cross Site Scripting
An attacker can use several PHP pages in order to inject HTML code in phpMyAdmin...
IPv6: vulnerabilities of IPv6 Routing Header
An attacker can send IPv6 packets in order to generate a denial of service or to obtain information...
ZZIPlib: buffer overflow of zzip_open_shared_io
An attacker can create a file with a long name generating an overflow in softwares linked with ZZIPlib...

   

Direct access to page 1 21 41 61 81 101 121 141 161 173 174 175 176 177 178 179 180 181 183 185 186 187 188 189 190 191 192 193 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1080