The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
phpMyAdmin: SQL injection
An attacker can use cookies to generate a SQL injection in phpMyAdmin...
ViewVC: information disclosure
An attacker can use several vulnerabilities of ViewVC in order to obtain information on projects...
WebSphere MQ: access to client process
A local attacker can access to the client MQ process...
WebSphere MQ: access to the queue
An attacker can bypass the access policy to the Queue Manager of WebSphere MQ...
ISS Internet Scanner: HTML injection
An attacker can inject HTML code in ISS Internet Scanner reports...
NetBSD: bypassing policy with FAST_IPSEC
When kernel is compiled with FAST_IPSEC, the IPsec policy (protocol/port) can be bypassed...
Wireshark: denials of service
Several vulnerabilities of Wireshark permit a remote attacker to create a denial of service...
D-Bus: bypassing the policy
A D-Bus application can bypass the security policy of the daemon...
Ghostscript: buffer overflow via color
An attacker can create a malicious PostScript or PDF file and invite the victim to open it in order to execute code on his computer...
CUPS: buffer overflow via URI
An administrator can create an overflow in CUPS...
Lotus Notes: Java signature
An unsigned Java applet can be signed by user when it is transfered by email...
MySQL 5.1: several vulnerabilities
An attacker can use several vulnerabilities of MySQL in order to access to a table, to elevate his privileges or to generate a denial of service...
Vim: command execution via http
An attacker can create a malicious document and invite the victim to open it with vim/gvim in order to execute a command...
QEMU, Xen: memory access
An attacker in a virtual system can access to the memory of host system...
DNSSEC-Tools: signature spoofing
Tools of the DNSSEC-Tools suite do not check if the announced public key is the same as the used one...
Solaris: denial of service of cpc
A local attacker can stop the system via two vulnerabilities of CPU Performance Counters...
VMware: access to host
An attacker in a virtual system under Windows can access to the host via shared folders...
CUPS: denials of service
An attacker can create two denials of service in CUPS...
Solaris: bypassing firewall
An attacker can send IP packets bypassing rules of a firewall or panicking the system...
OpenBSD 4.2: denial of service of IPv6 Routing
An attacker can send a malicious IPv6 packet in order to stop the system...
OpenBSD: denial of service of tcp_respond
An attacker can send a special TCP packet in order to generate a denial of service in OpenBSD...
Horde Turba: address edition
A local attacker can edit the address of another user in Horde Turba...
Solaris: information disclosure via DTrace
An attacker can obtain information on the kernel via DTrace Dynamic Tracing Framework...
SplitVT: privilege elevation
A local attacker can elevate his privileges via SplitVT...
Debian: access to MySQL database of dspam
Under Debian Linux, when dspam uses a MySQL database, a local attacker can obtain the used password...
AIX: denial of service of Pegasus
An attacker can generate a denial of service in IBM Pegasus CIM Server for Director...
CUPS: several vulnerabilities
Several vulnerabilities of CUPS permit an attacker to create a denial of service or to execute code...
Opera: several vulnerabilities
Opera is impacted by four vulnerabilities...
BEA, WebLogic: several vulnerabilities
An attacker can exploit several vulnerabilities of WebLogic Server/Express and of other BEA products...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 202 203 204 205 206 207 208 209 211 213 214 215 216 217 218 219 220 221 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1035