The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Fedora, RHEL: file access via seunshare
A local attacker can use seunshare, in order to access to temporary files which are normally protected by the sticky bit...
BIND: denial of service during IXFR/update
During an IXFR or a Dynamic Update, an attacker can send a query, in order to block the BIND server...
Linux kernel: data modification via debugfs/sysfs
A local attacker can write to debugfs/sysfs files, in order to alter the system behavior...
Linux kernel: memory corruption via a MacOS partition
An attacker can mount a device with a malicious MacOS partition, in order to corrupt the kernel memory, which leads to a denial of service or to code execution...
Asterisk: buffer overflow via T.38 UDPTL
When T.38 UDPTL is enabled, an attacker can use several overflows of Asterisk, in order to create a denial of service or to execute code...
Ruby: two vulnerabilities
An attacker can use two Ruby vulnerabilities, in order to alter a variable or to delete a file...
Evince: buffer overflow via DVI AFM linetoken
An attacker can invite the victim to open a malicious DVI file with Evince, in order to execute code on his computer...
Mailman: Cross Site Scripting via confirm.py
An attacker can use the Mailman confirmation page, in order to generate a Cross Site Scripting...
Avahi: infinite loop via mDNS
An attacker can send an empty mDNS packet, in order to create a denial of service in the Avahi daemon...
OpenJDK, IcedTea6: bypassing JNLP signature
An attacker can create a Java JNLP application containing several signatures, and which is not blocked by the OpenJDK compiled with IcedTea6...
OpenBSD: bypassing pf rules
On Little Endian, when the pf firewall uses rules containing IP address ranges, applied rules are different from the ones defined by the administrator...
Linux kernel: denial of service via br_multicast mr
An attacker can send an IGMP Membership Report packet to a bridge, in order to stop the system...
PHP Intl: denial of service via grapheme_extract
When an attacker can change the second parameter of the PHP grapheme_extract() function, he can stop the application...
vsftpd: denial of service via a pattern
An attacker can use a special file name, in order to force vsftpd to consume a lot of processor resources...
Wireshark: buffer overflow via dct3trace
An attacker can invite the victim to open a DCT3 capture with Wireshark, in order to create an overflow, leading to a denial of service or to code execution...
Linux kernel: buffer overflow via caiaq
An attacker can insert a USB device with a long name, in order to create an overflow in caiaq, leading to a denial of service or to code execution...
Linux kernel: memory reading via XFS FSGEOMETRY_V1
An attacker can use FSGEOMETRY_V1 ioctls on a XFS filesystem, in order to obtain four bytes from the kernel memory...
Linux kernel: register reading on s390 via task_show_regs
On a s390 processor, a local attacker can read the status file, in order to obtain values of registers of a process...
Linux kernel: denial of service via br_multicast
An attacker can send a special IGMP packet to a bridge, in order to stop the system...
shadow: user creation via chfn/chsh
A local attacker can use the chfn or the chsh tool of the shadow suite, in order to add a user on a NIS server...
Java JRE/JDK/SDK: several vulnerabilities
Several vulnerabilities of Java JRE/JDK/SDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code...
Windows AD: buffer overflow of Browser RequestElection
An attacker can send a large RequestElection packet to the Windows Master Browser, in order to create a denial of service, and possibly to execute code...
OpenLDAP: three vulnerabilities
Three vulnerabilities of OpenLDAP can be used by an attacker to bypass the authentication, or to stop the service...
PHP: denial of service via EXIF
An attacker can use an image with malformed EXIF data, in order to stop PHP applications...
phpMyAdmin: SQL execution via bookmark
A local attacker can create a malicious phpMyAdmin bookmark, so it is executed on accounts of other users...
PHP, libzip: denial of service via zip_name_locate
An attacker can use an empty ZIP archive, in order to force the libzip _zip_name_locate() function (and PHP ZipArchive) to dereference a null pointer...
Novell Open Enterprise Server: code execution via iPrint
A network attacker can send a malicious query to Novell iPrint Server, in order to execute code...
Linux kernel: memory corruption via btrfs_ioctl_space_info
When the btrfs filesystem is available, a local attacker can use an ioctl, in order to stop the system...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 293 294 295 296 297 298 299 300 301 303 305 306 307 308 309 310 311 312 313 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1039