The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Cisco Catalyst: denials of service of CSM
An attacker can generate two denials of service on CSM and CSM-S modules...
Gallery: several vulnerabilities
An attacker can exploit several vulnerabilities of Gallery via WebDAV...
OpenSSH: obtaining X11 cookie
An attacker, who can block the trusted X11 cookie copy operation, can obtain it...
IE: vulnerabilities of several ActiveX of September 2007
Several ActiveX permit a remote attacker to generate a denial of service or to execute code...
Red Hat Enterprise Linux: changes not detected by AIDE
Under Red Hat Enterprise Linux, the AIDE detection system does not detect file changes...
MapServer: several vulnerabilities
An attacker can generate an overflow and Cross Site Scripting attacks on MapServer...
MIT krb5: buffer overflows of kadmind
An attacker, authenticated or not authenticated, can create two overflows in kadmind in order to execute code...
Solaris: denial of service via strfreectty
A local attacker can use the strfreectty() function on a SPECFS filesystem in order to generate a denial of service...
id3lib: file corruption
A local attacker can alter a file with rights of applications linked to id3lib...
Linux kernel: unsigned CIFS NTLMv2
CIFS NTLMv2 exchanges are not signed if user request it...
PHP: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to conduct a denial of service or to execute code...
Linux kernel: denial of service via pwc
A local attacker can create a denial of service via a Philips webcam on USB...
Linux kernel: disk access via aacraid
A local attacker can use ioctls on aacraid driver in order to directly access to SCSI disk...
Apache httpd: denial of service of mod_proxy via Date
An attacker can use a malicious Date field in order to generate an error in mod_proxy to stop the current process...
fetchmail: denial of service via a warning
An attacker can generate errors in order to force fetchmail to send a warning message, then to stop if this message cannot be delivered...
Postfix policyd: buffer overflow
An attacker can generate an overflow in Postfix policyd in order to create a denial of service or to execute code...
WordPress: Cross Site Scripting of uploads.php
An attacker can create a Cross Site Scripting attack in the /upload.php script of WordPress...
Cisco Catalyst: VTY authentication bypass
An attacker can connect with telnet to some Cisco Catalyst IOS 12.2 without entering a password...
PHP: vulnerabilities of several extensions
Several vulnerabilities were discovered in PHP extensions...
Novell Client: buffer overflow of NWSPOOL.DLL
Several vulnerabilities of NWSPOOL.DLL permit a RPC attacker to execute code on computer...
WebLogic: several vulnerabilities
An attacker can exploit several vulnerabilities of WebLogic Server/Express...
Bugzilla: several vulnerabilities
Three vulnerabilities affect Bugzilla, the worst one leading to code execution...
Sylpheed: format string attack via POP3
An attacker with a POP3 server can execute code on Sylpheed clients connecting to it...
BIND 8: predictability of query ids
An attacker can predict query ids in order for example to poison the DNS server cache...
Firefox: computer detection via CSS
An attacker can use style sheets and the "visisted" attribute in order to detect computers reachable by the victim...
HP-UX: network configuration change
An administrator can involuntarily change network configuration of system...
ClamAV: command execution in black-hole-mode
When clamav-milter is configured in black-hole-mode, an attacker can use a malicious address in order to execute a command...
Asterisk: denial of service of voicemail via IMAP
An attacker can send a voicemail with an invalid MIME body in order to stop Asterisk when victim reads this message...
Sophos: denials of service of UPX and BZip
An attacker can create malicious files in order to generate a denial of service in Sophos antivirus...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 185 186 187 188 189 190 191 192 193 195 197 198 199 200 201 202 203 204 205 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1069