The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
IE: vulnerabilities of several ActiveX of June 2008
Several ActiveX can be used by a remote attacker to generate a denial of service or to execute code...
Asterisk: denial of service with pedantic
When Asterisk is configured in pedantic mode, an attacker can send a SIP message to stop it...
Tomcat: Cross Site Scripting of host-manager
An attacker can generate a Cross Site Scripting via the name parameter of the host-manager...
Solaris: privileges elevation via crontab
A local attacker can inject commands in the cron of other users...
Sun Cluster: file reading via GFS
A local attacker can read files deleted by Sun Cluster Global File System users...
VMware: code execution
Two vulnerabilities impact VMware ACE, VMware Player and VMware Workstation...
Lotus Notes: denial of service via wordwrap
An attacker can send an email with a very long line in order to create a denial of service in Lotus Notes...
imlib2: buffer overflow via PNM/XPM
An attacker can create a malicious PNM or XPM image leading to code execution when it is displayed by imlib2...
Fedora 8: network administration via system-config-network
On Fedora 8, an attacker with an access to the console can use system-config-network to alter network configuration...
stunnel: access via OCSP
An attacker can use a revoked certificate in order to access to stunnel...
CiscoWorks: code execution
An attacker can use a malicious url in order to execute code on the CiscoWorks Common Services web server...
Apache, ASP.NET, SiteMinder, Tomcat: bypassing VBAAC
The syntax of configuration files of some web servers can mislead the administrator...
Samba: buffer overflow of receive_smb_raw
An attacker can use an overflow of the Samba client or server in order to execute code...
OpenSSL: denials of service
Two denials of service impact applications linked to OpenSSL 0.9.8f and 0.9.8g...
EMC AlphaStor: code execution
Several vulnerabilities of EMC AlphaStor can be used by a network attacker to execute privileged code...
Linux kernel: denial of service of mmap/Sparc
On a Sparc processor, a local attacker can use mmap() to stop the kernel...
Sun Web Server: Cross Site Scripting of Search
An attacker can use the search feature of Sun Java System Web Server in order to create a Cross Site Scripting...
libpam-pgsql: bypassing authentication
An attacker can interrupt the libpam-pgsql authentication in order to access to the system...
Linux kernel: denial of service on x86_64
A local attacker can use ptrace on a x86_64 processor in order to stop the system...
Squid: vulnerabilities of authentication
An attacker can create a denial of service and possibly execute code during Squid authentication...
Solaris: denial of service of SAD
A local attacker can panic the system by using STREAMS Administrative Driver...
AIX: several vulnerabilities
Several AIX vulnerabilities can be used by an attacker to elevate his privileges or to create a denial of service...
Snort: bypassing with fragments
An attacker can fragment his IP packets in order to bypass all Snort rules...
Cisco IOS: denials of service of SSH
A non authenticated attacker can create three denials of service in the IOS SSH service...
SAP WAS: Cross Site Scripting of ICF
An attacker can use a Cross Site Scripting attack on SAP application server...
Fedora, RHEL: denial of service of vsftpd
The vsftpd package of Fedora/RHEL is impacted by a denial of service...
Lotus Domino: Cross Site Scripting
An attacker can create a Cross Site Scripting on the Lotus Domino web server...
libxslt: memory corruption via template match
An attacker can create a malicious XSL style sheet in order to create a denial of service or to execute code in applications linked to libxslt...
GnuTLS: several vulnerabilities
An attacker can use several GnuTLS vulnerabilities in order to create a denial of service and possibly to execute code...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 209 210 211 212 213 214 215 216 217 219 221 222 223 224 225 226 227 228 229 241 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1039