The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PHP 5: several vulnerabilities
An attacker can use several vulnerabilities of PHP 5 in order to create a denial of service or to execute code...
Solaris: denial of service of SVM
A local attacker can use a malicious Solaris Volume Manager ioctl in order to panic the system...
HP-UX: privilege elevation via Aries PA Emulator
A local attacker can elevate his privileges via a vulnerability of Aries PA Emulator...
Firefox: Cross Site Scripting via jar
An attacker can upload a jar archive on a public site in order to create a Cross Site Scripting on this site...
Net-SNMP: denial of service via GETBULK
An attacker can create a denial of service by requesting numerous data with GETBULK...
CA SiteMinder Agent: Cross Site Scripting
An attacker can create a Cross Site Scripting attack in CA SiteMinder Agent...
Oracle DB: buffer overflow of XDB.XDB_PITRIG_PKG.PITRIG_DROPMETADATA
An authenticated attacker can create an overflow in XDB.XDB_PITRIG_PKG.PITRIG_DROPMETADATA in order to obtain privileges of database...
GForge: file modification
A local attacker can use a symbolic link in order to change a file with GForge rights...
RHEL: denial of service of mcstrans
A local attacker can create a denial of service in the mcstransd daemon...
Conga: denial of service of ricci
An attacker can connect to ricci in order to forbid other connections...
CUPS: denial of service via SSL
When SSL is activated, an attacker can forbid access to service for users...
Xpdf: three vulnerabilities
An attacker can create a malicious PDF document leading to code execution on computer of users opening it with Xpdf, or its derivatives...
Informix DS: vulnerabilities
Two vulnerabilities of Informix Dynamic Server permit an attacker to execute code or to create a denial of service...
Windows: privilege elevation via DebugView
A local attacker can obtain administrator privileges by using the Dbgv.sys driver...
Linux kernel: integer overflow of ieee80211_rx
An attacker can send a malicious 802.11 packet in order to create a denial of service...
QuickTime: several vulnerabilities
Several QuickTime vulnerabilities can lead to code execution...
Perl, PCRE: vulnerabilities of regular expressions
When attacker can change the regular expression used by a program, he can corrupt its memory in order for example to execute code...
Perdition: format string attack of IMAP proxy
A non authenticated attacker can create a format string attack in Perdition IMAPD in order to execute code...
Emacs: code execution via enable-local-variables
The enable-local-variables directive of Emacs is ignored, which permits to execute code when victim opens a malicious file...
Solaris: privilege elevation via SRS Net Connect
A local attacker can use a format string attack of a SRS Net Connect tool in order to obtain root privileges...
IE: vulnerabilities of several ActiveX of November 2007
Several ActiveX permit a remote attacker to generate a denial of service or to execute code...
WebSphere AS: vulnerabilities of navigateTree.do
One Cross Site Scripting attack and several Cross Site Request Forgery attacks can be exploited via UDDI...
Liferea: feed list disclosure
A local attacker can obtain the list of RSS feeds of Liferea users...
Linux kernel: denial of service of VFAT
On a 64 bits processor, a local attacker can create a denial of service by using a VFAT ioctl...
Blue Coat ProxySG: Cross Site Scripting
Two Cross Site Scripting can be exploited on the web administration console of Blue Coat ProxySG...
Sendmail: denial of service via MIME
An attacker can use long MIME lines in order to generate an error in Sendmail...
Lotus Notes: access to another user data
An attacker using Lotus Notes on the same Windows machine as another user can access his data...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 191 192 193 194 195 196 197 198 199 201 203 204 205 206 207 208 209 210 211 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1047