The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Mono: buffer overflow of BigInteger
An attacker can generate an overflow in the BigInteger class of Mono...
Linux kernel: reading memory under PowerPC
Under PowerPC, a local attacker can use some drivers to read areas of kernel memory...
RHEL 5: denial of service of DLM
An attacker can connect to the TCP port of Distributed Lock Manager in order to generate a denial of service...
RHEL 5: denial of service under 64bits
A local attacker can create a denial of service on a AMD64 or Intel 64 computer...
CUPS: buffer overflow of IPP
A network attacker can generate an overflow in CUPS in order to create a denial of service or to execute code...
AIX: several vulnerabilities
Several vulnerabilities permit a local attacker to elevate his privileges...
Pidgin: denial of service via HTML
An attacker can send a message containing malformed HTML code in order to stop Pidgin...
RealPlayer, HelixPlayer: several vulnerabilities
An attacker can run code on computer of RealPlayer or HelixPlayer users...
Solaris 10: local denial of service via IP
A local attacker can create a denial of service of the system, exploiting a vulnerability in IP...
Python: several integer overflows
An attacker can generate several integer overflows in imageop and rbgimgmodule modules of Python...
IBM Tivoli Storage Manager Client: HTML injection
An attacker can connect to the HTTP service of CAD in order to inject HTML data, and notably JavaScript code...
Solaris: denial of service via SCTP INIT
A remote attacker can stop system if a SCTP socket is listening...
Nagios Plugins: buffer overflow of check_snmp
An attacker can setup a malicious SNMP service in order to execute code in Nagios...
OpenLDAP: denials of service
An attacker can generate two denials of service in OpenLDAP...
Trend Micro AntiVirus scan engine: buffer overflow in Tmxpflt.sys
A local attacker can run code on the system by exploiting a buffer overflow of Trend Micro AntiVirus scan engine...
xen-utils: file corruption
A local attacker can alter a file during xen-utils usage...
HP OpenView: information disclosure via Radia or CCM
An attacker can read files by exploiting a vulnerability of httpd.tkd installed with HP OpenView Configuration Management (CM) Infrastructure (Radia) and Client Configuration Manager (CCM)...
Lotus Domino: several vulnerabilities
Several vulnerabilities were announced in Lotus Domino...
Lotus Notes: several buffer overflows
A remote attacker can create illicits documents in order to create a buffer overflow when these documents are read...
Xscreensaver: denial of service
An attacker with physical access to the machine can gain access to a locked session by exploiting a denial of service of xscreensaver...
JRE: privilege escalation of an applet
A remote attacker can create a malicious Java applet in order to run code on the machine of the target...
Drupal: several vulnerabilities
Several vulnerabilities of Drupal were announced, the worst one leading to command injection on the server...
Cisco IOS: denial of service via an EAP Response Identity packet
An attacker of the local network can send an illicit EAP Response Identity packet in order to reboot the equipment...
Nagios: Cross Site Scripting in CGI scripts
An attacker can create a Cross Site Scripting attack in CGI scripts of Nagios...
Seamonkey: several vulnerabilities
Several vulnerabilities were announced in Seamonkey, the worst one leading to code execution...
Thunderbird: two vulnerabilities
Two vulnerabilities were announced in Thunderbird, the worst one leading potentially to code execution...
Solaris: denial of service of the kernel
A local attacker can create a denial of service of the Solaris kernel...
phpMyAdmin: Cross Site Scripting of server_status.php
An attacker can use parameters of server_status.php script in order to inject HTML code in phpMyAdmin...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 190 191 192 193 194 195 196 197 198 200 202 203 204 205 206 207 208 209 210 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1020