The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Solaris: root access via NFS
An attacker who is root on a remote server can access to files exported by NFS...
QuickTime: vulnerabilities of QTL and Flash
Several QuickTime vulnerabilities can lead to code execution...
wpa_supplicant: buffer overflow via TSF
An attacker can send a message with a TSF in order to generate an overflow...
KAME, BSD, JUNOS: denial of service via IPv6
An attacker can send a malicious IPv6 packet in order to stop the system...
HP-UX: memory corruption of DCE
A network attacker can create a denial of service or execute code on applications using DCE...
AIX: several vulnerabilities
Several AIX vulnerabilities were announced...
Apache httpd: Cross Site Scripting of mod_imap/mod_imagemap
An attacker can use a special url in order to generate a Cross Site Scripting in mod_imap or mod_imagemap...
RHEL, Fedora, Mandriva: privilege elevation via autofs
An attacker can store a suid program on a NFS share in order to elevate his privileges with autofs...
MySQL Community 5.0: several vulnerabilities
An attacker can use three vulnerabilities of MySQL Community in order to access to a table or to generate a denial of service...
Windows Vista: privilege elevation via ALPC
A local attacker can elevate his privileges using an ALPC vulnerability...
Windows: buffer overflow de Message Queuing
An authenticated attacker can send a malicious MSMQ message in order to execute code with LOCALSYSTEM privileges...
Windows Vista: usurpation de la signature SMBv2
An attacker can alter SMBv2 packets and recompute the signature...
Internet Explorer: several vulnerabilities
Several vulnerabilities of Internet Explorer lead to code execution...
Windows Media: overflows via ASF
An attacker can create four overflows in Windows Media Format/Services via a malformed ASF file...
Windows: vulnerabilities of DirectX
An attacker can use two vulnerabilities of DirectX/DirectShow in order to execute code on the computer...
Linux kernel: denial of service of sysfs_readdir
A local attacker can use readdir() in order to stop the system...
Squid 2: denial of service via ICAP
An authenticated attacker can force ICAP to consume all memory of proxy...
Samba: buffer overflow of send_mailslot
When Samba is configured as a domain controller, an attacker can send a malicious GETDC request in order to execute code on the server...
Ruby-GNOME 2: format string attack
An attacker can create a format string attack in some applications using Ruby-GNOME 2...
Drupal: SQL injection via taxonomy
An attacker can use some modules in order to inject SQL commands in Drupal...
MIT krb5: several memory corruptions
An attacker can use several vulnerabilities of MIT Kerberos 5 in order to create a denial of service or to execute code...
Little CMS: buffer overflow via ICC
An attacker can create a malicious JPEG image in order to execute code on computer of victims opening it with Little CMS...
e2fsprogs: several integer overflows
An attacker can create a malicious ext2 image in order to execute code with rights of users handling it with e2fsprogs tools...
Heimdal: memory corruption of gss_userok
An attacker can create a memory free error in gss_userok(), leading to a denial of service and possibly to code execution...
OpenView NNM: code execution via CGI
Several CGI applications of OpenView Network Node Manager permit a non authenticated attacker to execute code...
MySQL: table access via DATA or INDEX DIRECTORY
An attacker can create a table using DATA or INDEX DIRECTORY option in order to access system tables...
Sun SPARC Enterprise Mx000: denial of service of XCP
An attacker can create a denial of service via XCP on SPARC Enterprise M4000 models and above...
ZABBIX: command execution with root group
An attacker can use ZABBIX to execute commands with gid 0...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 194 195 196 197 198 199 200 201 202 204 206 207 208 209 210 211 212 213 214 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013