The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
PostgreSQL: information disclosure
An attacker can obtain information on data of a table that he cannot read...
Asterisk: denial of service in pedantic mode
When Asterisk is configured in pedantic mode, an authenticated attacker can stop it...
Windows: DNS and WINS spoofing
Several vulnerabilities of DNS and WINS can be used by an attacker to redirect victims...
Windows: TLS authentication via SChannel
An attacker owning a valid public key can authenticate on services protected by SChannel...
Windows: three kernel vulnerabilities
Three vulnerabilities of the Windows kernel can be used by an attacker to execute code...
Solaris: access to NFS files
When a NFS server uses AUTH_NONE and AUTH_SYS, an authenticated client can access to server files with the same uid...
IBM TSM: buffer overflow of HSM
An attacker can generate a buffer overflow in the Windows client of IBM Tivoli Storage Manager HSM...
Solaris: denial of service of NFSv4
A local attacker can create a denial of service when an HSFS file system is shared with NFS...
Apache Tomcat: Cross Site Scripting of an example
An attacker can generate a Cross Site Scripting in an example provided with Apache Tomcat...
Poppler: denials of service
An attacker can create a malicious PDF document and invite the victim to open it with a Poppler application in order to stop it...
NetworkManager: two vulnerabilities
Two vulnerabilities of NetworkManager can be used by a local attacker to obtain network passwords or to change the network configuration...
JBossWS: reading an XML file
An attacker can use a special url in order to force JBossWS to return a local XML file...
OpenBSD: denial of service via fts
A local attacker can use a long path in order to stop applications using the fts_* functions of the libc...
Linux kernel: denial of service via ipcs
A local attacker can use the ipcs command to stop the system...
WebSphere AS 6.1.0: several vulnerabilities
Several vulnerabilities of WebSphere AS can be used to attack the service...
jhead: several vulnerabilities
Several jhead vulnerabilities can be used by an attacker to execute code...
Solaris: denial of service of Crypto Driver
A local attacker can use an ioctl in order to stop the system via a vulnerability of Crypto Driver...
Solaris: Cross Site Scripting of SunMC
An attacker can create a Cross Site Scripting in Sun Management Center...
libpam: incorrect UTF-8 login handling
The libpam library does not correctly handle Unicode characters located in usernames...
Firefox, Thunderbird, SeaMonkey: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to obtain information, to create a denial of service or to execute code on victim's computer...
Cisco 7600: denial of service via SBC
An attacker can send a malicious packet in order to stop the Session Border Controller module on the Cisco 7600 router...
libsndfile: integer overflow via CAF
An attacker can create a malicious CAF file in order to execute code in applications linked to libsndfile...
IE: vulnerabilities of several ActiveX of March 2009
Several ActiveX can be used by a remote attacker to generate a denial of service or to execute code...
Cisco ACE: several vulnerabilities
Several vulnerabilities impact the Cisco ACE Application Control Engine module for Cisco Catalyst 6500 and Cisco Router 7600...
MySQL: denial of service via XPath
A local attacker can use a malformed XPath expression in order to stop MySQL...
Opera: several vulnerabilities
Several Opera vulnerabilities lead to code execution or to a Cross Site Scripting...
cURL: local file reading
An attacker can use a redirect to force cURL to read a local file...
Linux kernel: using forbidden system calls on x86_64
On an Intel x86_64 computer, a local attacker can bypass system call restriction mechanisms...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 231 232 233 234 235 236 237 238 239 241 243 244 245 246 247 248 249 250 251 261 281 301 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1041 1061 1070