The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Pidgin: denial of service of the client
A remote attacker can create a denial of service of the client by sending a "nudge" message...
Xensource: privilege escalation when booting the guest domain
An attacker possessing a guest domain on a Xensource server, can run code on the host domain...
X.Org: vulnerabilities of xfs
An attacker can use two vulnerabilities of xfs in order to corrupt memory or to execute code...
Linux Kernel: denial of service via hugetlbfs
A local attacker can create a denial of service using the hugetlb_vmtruncate_list() function...
Sun Java Application Server: vulnerabilities with Sun Java System Access Manager
Installing Sun Java System Access Manager can compromise the application server security...
Checkpoint VPN-1: several buffer overflows
An attacker with admin rights can obtain expert rights...
Ruby: incorrect validation of certificate by Net-HTTPS
The Net::HTTP and Net::HTTPS libraries do not check real name of remote server...
Tcl/Tk: buffer overflow of GIF
An attacker can create a malicious animated GIF in order to generate an overflow in Tcl/Tk...
OpenSSL: off by one of SSL_get_shared_ciphers
An attacker can generate an overflow of one byte in the SSL_get_shared_ciphers() function...
Linux kernel: incorrect permissions on JFFS2
When POSIX ACLs are activated, files created on a JFFS2 filesystem have incorrect permissions...
Linux kernel: umask not honoured via CIFS
The CIFS client of kernel does not honour umask of process...
Linux kernel: denial of service via acct_stack_growth
On a PowerPC processor, a local attacker can force the acct_stack_growth() function to use a memory area expanding inside hugetlb, in order to stop the system...
Linux kernel: denial of service via ptrace
A local attacker can create a denial of service with a program using PTRACE_SETREGS and PTRACE_SINGLESTEP...
F-Secure Anti-Virus: bypassing on 64bits
On a 64bits platform, viruses located in some archives or packed executables are not detected...
Cisco Catalyst: access via loopback
An attacker can bypass ACLs by sending a packet to the loopback address...
Solaris: denial of service of Thread Contexts
A local attacker can create a program using threads in order to panic the system...
Solaris: denial of service via HID
A local attacker can panic system by exploiting a vulnerability of Human Interface Device driver...
F-Secure: base policies not updated
After a few days of operation, F-Secure Management Agent cannot update base policies and statistics...
Linux kernel: memory reading via snd-page-alloc
A local attacker can read memory fragments via the snd-page-alloc module...
libsndfile: buffer overflow via FLAC
An attacker can create a malicious stream in FLAC format in order to generate an overflow in applications linked to libsndfile...
Elinks: unencrypted POST data
When Elinks is configured to connect to a HTTPS proxy, POST data are sent in clear text...
Kaspersky AV: denial of service
A local attacker can generate a denial of service in klif.sys...
ImageMagick: vulnerabilities via DCM, DIB, XBM, XCF or XWD
An attacker can create a malicious DCM, DIB, XBM, XCF or XWD image leading to a denial of service or to code execution on computers of ImageMagick users...
Linux kernel: privilege elevation via ptrace on x86_64
On a x86_64 architecture, a local attacker can ptrace a 32 program in order to elevate his privileges...
Webmin: code execution
An attacker authenticated to Webmin can execute code under Windows...
Adobe Acrobat: vulnerability
A vulnerability was announced in Adobe Acrobat...
Microsoft ISA Server 2004: obtaining visited IP addresses
An attacker can obtain IP address of site previously visited via SOCKS4 proxy...
KDM: connection without a password
Under certain circumstances, an attacker can login via KDM without entering a password...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 187 188 189 190 191 192 193 194 195 197 199 200 201 202 203 204 205 206 207 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020