The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Fedora: buffer overflow of wpa_supplicant
An attacker can generate an overflow in a wpa_supplicant patch specific to Fedora...
Lotus Domino: privilege elevation via an agent
An allowed attacker can alter an agent and thus elevate his privileges...
Solaris: bypassing xscreensaver
When GNOME Assistive Technology is activated, an attacker can execute commands with privileges of user who locked his session...
SNMPc: denial of service
An attacker can send a malicious packet in order to stop SNMPc...
PHP PEAR: file creation
An attacker can construct a malicious PEAR archive in order to create files on computer of victims who install this archive...
util-linux, login: bypassing access restrictions
In some cases, access restrictions are not honoured by login...
Lotus Domino: denial of service of web server
An attacker can use a malicious url in order to stop web service...
Novell NetWare: bypassing ftprest.txt
In some cases, an attacker can bypass restrictions imposed by sys:etc\ftprest.txt...
Webmin: Cross Site Scripting of pam_login.cgi
An attacker can generate a Cross Site Scripting in Webmin...
GNU screen: unlocking console
A local attacker can unlock console locked by GNU screen...
Outpost Firewall: denial of service via outpost_ipc_hdr
A local attacker can use the outpost_ipc_hdr mutex in order to block Outpost Firewall, and to force victim to restart system...
GNU gdb: memory corruption via an UPX file
An attacker can invite victime to open a malicious UPX file with gdb, in order to execute code on his computer...
phpPgAdmin: Cross Site Scripting
Two Cross Site Scripting can be exploited in phpPgAdmin...
IE: vulnerabilities of several ActiveX of June 2007
Several ActiveX permit a remote attacker to generate a denial of service or to execute code...
Windows: enumerating usernames with time restriction
When time restriction is activated, an attacker can detect valid usernames...
Postfix: IPv6 connexions handled as localhost
When IPv6 is deactivated, connections coming from inetd are handled as if they come from localhost...
libexif: integer overflow of exif_data_load_data_entry
An attacker can create an image generating an integer overflow in exif_data_load_data_entry() of libexif...
JasPer: memory corruption via jpc_qcx_getcompparms
An attacker can create a malicious image in order to execute code on computers of victims opening it with a software linked with JasPer...
PHP: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to conduct a denial of service or to execute code...
GNU Findutils: buffer overflow of locate
When locate program of GNU Findutils uses an old database version, a local attacker can generate an overflow...
Firefox: information disclosure via resource
An attacker can create a HTML page obtaining some information about installation of Firefox or read files...
AIX: user access via Perl
A local attacker can execute code with privileges of Perl users...
AIX: denial of service of WebSM
A remote attacker can force WebSM to use all system memory...
F-Secure AV: several vulnerabilities
Four vulnerabilites were announced in F-Secure products...
ClamAV: several vulnerabilities
Several vulnerabilities of ClamAV lead to denials of service or to code execution...
SeaMonkey 1.0: several vulnerabilities
Several vulnerabilities were announced in SeaMonkey 1.0, the worst one leading to code execution...
SeaMonkey 1.1: several vulnerabilities
Several vulnerabilities were announced in SeaMonkey 1.1, the worst one leading to code execution...
Thunderbird 1.5: several vulnerabilities
Several vulnerabilities were announced in Thunderbird 1.5, the worst one leading to code execution...
Thunderbird 2.0: several vulnerabilities
Several vulnerabilities were announced in Thunderbird 2.0, the worst one leading to code execution...
Firefox 1.5: several vulnerabilities
Several vulnerabilities were announced in Firefox 1.5, the worst one leading to code execution...

   

Direct access to page 1 21 41 61 81 101 121 141 161 176 177 178 179 180 181 182 183 184 186 188 189 190 191 192 193 194 195 196 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1078