The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Gimp: multiples denials of service
Opening malicious BMP, PCX, PSD or PSP images stops or slows down Gimp...
GNU tar: directory traversal
An attacker can invite user to open a malicious tar archive in order to create files outside current directory...
SUSE Linux: disk access via orarun
The "oracle" user is incorrectly added to the "disk" group...
Solaris: denial of service via ATA
On a x86 computer with ATA disks, a local attacker can panic system...
Trend Micro ServerProtect: several vulnerabilities
Several overflows permit a network attacker to execute code on Trend Micro ServerProtect...
Trend Micro PC-cillin: buffer overflow of VST
A local attacker can exploit an overflow in Trend Micro PC-cillin in order to execute code with system privileges...
Asterisk: denial of service via SIP dialog history
A non authenticated attacker can progressively exhaust system memory via a long SIP dialog...
Palm OS Treo: denial of service via ICMP
An attacker can send continuous ICMP Echo Request packets in order to create a denial of service on Palm OS Treo Smartphone...
ZoneAlarm: two vulnerabilities
A local attacker can use two vulnerabilities in order to generate a denial of service or to execute code...
ClamAV: denial of service via RTF or HTML
An attacker can create a malicious RTF or HTML document in order to stop ClamAV...
NetWorker: buffer overflow of nsrexecd
An attacker can create an overflow of nsrexecd in order to generate a denial of service or to run code...
Sysstat: file creation
A local attacker can create a symbolic link in order to force Sysstat to create a file with root privileges...
Cisco IOS: denial of service via regexp
An attacker allowed to run "show ip bgp regexp" can reboot the router...
Symantec Enterprise Firewall: valid login detection
An attacker can detect if a login name for a PSK authentication is valid...
Solaris: user access via RBAC
An attacker can connect to system by using RBAC roles...
Konqueror: address bar spoofing
An attacker can use two vulnerabilities to change the contents of the address bar of Konqueror...
rsync: overflow of f_name
An attacker can generate two overflows of one byte in rsync...
Java JRE, JDK, SDK: privilege elevation via a font
A malicious Java applet can generate an error when a font is parsed in order to execute code...
McAfee Virus Scan: buffer overflow
Under Unix, a buffer overflow occurs when McAfee Virus Scan analyzes a file with a long name...
NetBSD, OpenBSD: concurrency error in Systrace
A local attacker can bypass Systrace by editing data after their check...
Xfce: code execution via Terminal
The Terminal emulator of Xfce does not correctly check urls before calling web browser...
Opera: code execution via JavaScript
An attacker can create a malicious HTML document using JavaScript in order to execute code on computer of victim...
Linux kernel: buffer overflow via read_wakeup_threshold
When administrator changed the default configuration of random generator, a local attacker can generate an overflow...
Cisco VPN Client: privilege elevation
A local attacker can elevate his privileges via the Cisco VPN Client...
Linux kernel: sending a signal to a privileged process
A local attacker can send a signal to a suid or sgid process he executes...
Linux kernel: denial of service via usblcd
A local attacker can exhaust system memory by using usblcd...
IE: buffer overflow of VML
An attacker can create a HTML document containing malicious VML data in order to execute code on victim's computer...
Windows Vista: vulnerabilities of Gadget
Three vulnerabilities affect Feed, Contacts and Weather Gadgets...
Windows Media Player: code execution via skins
An attacker can create a malformed skin in order to execute code on computer of victims opening it with Windows Media Player...
Windows: overflow of GDI
An attacker can create a malicious image leading to code execution in GDI...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 184 185 186 187 188 189 190 191 192 194 196 197 198 199 200 201 202 203 204 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1012