The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
imlib: infinite loop of _LoadBMP
An attacker can create a malicious BMP image generating an infinite loop on computer of victims opening it with a software linked to imlib...
WinPcap: denial of service of BIOCGSTATS
A local attacker can use the BIOCGSTATS ioctl in order to stop system...
PHP: queries modification of Structures_DataGrid_DataSource_MDB2
An attacker can manipulate queries generated by Structures_DataGrid_DataSource_MDB2 PEAR module...
Gimp: integer overflow via PSD
An attacker can create a malicious PSD image leading to a denial of service or to code execution on computer of victim opening it with Gimp...
IE: vulnerabilities of several ActiveX of July 2007
Several ActiveX permit a remote attacker to generate a denial of service or to execute code...
ekg: three denial of service
An attacker can generate three denials of service in ekg client...
Perl Net-DNS: two vulnerabilities
The Net::DNS module of Perl has two vulnerabilities...
GSAMBAD: file corruption
A local attacker can force GSAMBAD to corrupt a file with root privileges...
FireFlier: file deletion
A local attacker can force the fireflierd daemon to delete a file with root privileges...
IE: altering document.domain
A script can alter document.domain in order to bypass zone restrictions...
JRE, JDK, SDK: file modification via Java Web Start
A Java application can alter a file with victim's rights...
JDK: Cross Site Scripting via JavaDoc
Documents generated by JavaDoc can be used to generate a Cross Site Scripting attack...
Hiki: file deletion
An attacker can force Hiki to delete a file...
Solaris: denial of service of KSSL
A local attacker can panic system if KSSL is activated...
Solaris: buffer overflow of dtsession
A local attacker can elevate his privileges by using a buffer overflow of dtsession...
Solaris: denial of service of TCP Fusion
A local attacker can generate a denial of service on servers where the TCP fusion is activated...
Red Hat: buffer overflow of cman
An attacker can generate a buffer overflow in Red Hat Cluster Manager...
Curl, c-ares: identifier predictability
Randoms numbers used by c-ares are predictable, which permit an attacker to spoof DNS packets...
Wireshark, Ethereal: several vulnerabilities
Several vulnerabilities of Wireshark permit a remote attacker to create a denial of service...
Lotus Domino: vulnerability
A vulnerability affects Lotus Domino...
Solaris: denial of service of nscd via libsldap
A local attacker can generate an error in libsldap in order to stop nscd...
SAP, NetWeaver: several Cross Site Scripting
Several Cross Site Scripting affect SAP NetWeaver Web Dynpro Java and Internet Communication Framework...
CheckPoint VPN-1 UTM Edge: Cross Site Request Forgery
The management interface of VPN-1 UTM Edge is vulnerable to a Cross Site Request Forgery attack...
PHP: bypassing safe mode via htaccess
A local attacker can use htaccess directives to bypass some restrictions of safemode...
Nessus: two vulnerabilities
An attacker can generate a denial of service and a Cross Site Scripting attack against Nessus...
libgd: several vulnerabilities
Several vulnerabilities of libgd can lead to denials of service or to code execution...
RealPlayer, HelixPlayer: buffer overflow via SMIL
An attacker can use malicious SMIL data in order to generate an overflow in RealPlayer and HelixPlayer...
Apache httpd: denial of service of mod_cache
An attacker can use a malicious HTTP query in order to stop mod_cache...
Apache httpd: Cross Site Scripting of mod_status
When mod_status is activated, an attacker can generate a Cross Site Scripting attack...
MIT krb5: buffer overflow of kadmind
An authenticated attacker can generate an overflow in kadmind in order to execute code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 179 180 181 182 183 184 185 186 187 189 191 192 193 194 195 196 197 198 199 201 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020