The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Linux kernel: core dump reading
An attacker can create a core file, then force a process to coredump in order to read its contents...
Thunderbird 1.5: two vulnerabilities
Two vulnerabilities were announced in Thunderbird 1.5, the worst one leading to code execution...
Tru64 UNIX: denial of service via FFM
A local attacker can create a denial of service via File-on-File Mounting...
Ganglia: several Cross Site Scripting
Several Cross Site Scripting of Ganglia permit an attacker to execute Javascript code in the context of another domain...
Exiv2: integer overflow
A malicious image can create an integer overflow leading to code execution in Exiv2...
RHEL 5, Fedora: reading rndc key of bind
A local attacker can read the /etc/rndc.key key in order to use rndc...
RHEL, Fedora, Mandriva: device access via autofs
An attacker can create a device on a NFS share in order to access to devices with autofs...
HP-UX: denial of service of rpc.yppasswdd
A remote attacker can create a denial of service in rpc.yppasswdd...
Linux kernel: reading memory fragments
In some cases, a local attacker can obtain memory areas containing data of other users...
Linux kernel: denial of service via IPv6 Hop-by-Hop
An attacker an use an IPv6 packet with an Hop-by-Hop header in order to stop the kernel...
Ingres: incorrect authentication
Under Windows, the second user who logs into Ingres is connected as the first user...
ClamAV: overflow via MS-ZIP
An attacker can create a malicious MS-ZIP archive in order to create an off by one overflow in ClamAV...
libexif: two vulnerabilities
An attacker can use two vulnerabilities in applications linked to the libexif library...
Cisco IOS, CatOS: denial of service of FWSM via TCP
An attacker can send sequences of out of order TCP packets in order to stop the FWSM module...
Sun Ray Server Software: two vulnerabilities
An attacker can use two vulnerabilities of Sun Ray Server Software to create or delete directories, or to create a denial of service...
Solaris: incorrect audit of sshd
With certain patches, audit records of sshd have an incorrect "audit-ID"...
Solaris: access to database of Sun MC
By using a default password, an attacker can access to the Sun Management Center database...
Opera: several vulnerabilities
Four vulnerabilities affect Opera, the worst one leading to code execution...
Asterisk: bypassing authentication
When a "realtime" database is configured, an attacker can authenticate if he knows a valid login...
ClamAV: integer overflow via MEW
An attacker can create a malicious PE file in order to execute code on ClamAV...
Flash Player: several vulnerabilities
Several Adobe Flash Player vulnerabilities permit an attacker to execute code...
CUPS: overflow of SNMP asn1_get_string
An attacker can create an overflow in the SNMP backend of CUPS...
scponly: command execution
When scponly is used with rsync, svn, svnserve or unison, an authenticated attacker can access to the system...
syslog-ng: denial of service
An attacker can send a malicious message in order to stop syslog-ng...
Linux kernel: bypassing systrace policies
A local attacker can bypass systrace policies...
Xfce: several vulnerabilities
Several vulnerabilities of Xfce permit an attacker to execute code...
MyDNS: overflow via an UPDATE
An attacker allowed to send a DNS UPDATE query can create a denial of service or execute code on MyDNS...
Linux kernel: denial of service of hrtimer
A local attacker can create a denial of service via hrtimers...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 195 196 197 198 199 200 201 202 203 205 207 208 209 210 211 212 213 214 215 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1013