The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.
History of vulnerabilities analyzed by Vigil@nce:
Webmin: privilege elevation via Full Name
A local attacker can change his Full Name, in order to force the execution of privileged commands, when root will display users via Webmin...
PHP: heap overflow via Phar
An attacker can provide a malicious Phar archive, in order to create a heap overflow, leading to a denial of service or to code execution...
HP SiteScope: Cross Site Scripting
An attacker can generate a Cross Site Scripting or inject HTML code in HP SiteScope...
nfs-utils: corruption of mtab via RLIMIT_FSIZE
A local attacker can use mount.nfs and the RLIMIT_FSIZE limit, in order to corrupt the /etc/mtab file...
QEMU-KVM: buffer overflow via virtio-blk
A privileged attacker in a QEMU-KVM guest system can generate an overflow, in order to stop the host system, or to execute code...
Asterisk: two vulnerabilities
An attacker can use two vulnerabilities of Asterisk, in order to create a denial of service or to execute code...
Adobe Acrobat, Reader: code execution via CoolType.dll
An attacker can create a malicious PDF document, and invite the victim to open it, in order to execute code on his computer...
Linux kernel: memory corruption via AGPgart
A local attacker can use two vulnerabilities of AGPgart, in order to corrupt the memory, to create a denial of service or to elevate his privileges...
RH JBoss EAP: Java code execution via Seam
An attacker can use a vulnerability of JBoss Seam, in order to execute Java code on JBoss Enterprise Application Platform...
TCP, Firewalls: TCP Split Handshake
An attacker owing a malicious server can use a special TCP initialization sequence, in order to force the firewall to open a TCP session to the client...
FreeBSD: bypassing NFS mountd ACL
When FreeBSD exports directories via NFS, network ACL are not correctly computed, and allow IP addresses which should be forbidden...
Linux kernel: denial of service via CAN RAW
A local attacker can use a CAN RAW socket, in order to stop the system...
CA SiteMinder Web Agent: user access
An attacker can use a malformed query, in order to access to CA SiteMinder Web Agent with privileges of another user...
IBM DB2 9.7: three vulnerabilities
An attacker can use three vulnerabilities of IBM DB2, in order to execute code or privileged features...
OpenSSL: Man-in-the-middle FIPS Diffie Hellman
When OpenSSL is compiled in FIPS mode, a Man-in-the-middle attacker can force the generation of a predictable Diffie Hellman secret...
Linux kernel: denial of service via CAN BCM
A local attacker can use a CAN BCM socket, in order to stop the system...
PolicyKit: privilege elevation via pkexec
A local attacker can use pkexec, in order to execute code with root privileges...
Solaris: several vulnerabilities of April 2011
Several vulnerabilities of Solaris are corrected by the CPU of April 2011...
Sun GlassFish, Application Server: code execution via Web Administration
A remote attacker can execute code in Sun GlassFish Enterprise Server and Sun Java System Application Server...
Oracle Fusion Middleware: several vulnerabilities of April 2011
Several vulnerabilities of Oracle Fusion Middleware are corrected by the CPU of April 2011...
Oracle Database: several vulnerabilities of April 2011
Several vulnerabilities of Oracle Database are corrected by the CPU of April 2011...
Linux kernel: denial of service via /proc next_pidmap
An attacker can access to the /proc directory, in order to stop the Linux kernel...
EMC NetWorker: privilege elevation via Client Push
A local attacker can use the Client Push feature of EMC NetWorker, in order to elevate his privileges...
HP NNMi: code execution
A remote attacker can execute code in Network Node Manager i...
WebSphere AS: decryption of JAX-RPC or JAX-WS
An attacker who captured encrypted JAX-RPC or JAX-WS data can decrypt them...
Cisco IOS: IKE connection without OCSP
An attacker with a revoked certificate can create an IPsec tunnel with Cisco IOS...
Asterisk: user detection via INVITE
An attacker can use the INVITE method, in order to detect if a username is valid...
Wireshark: three vulnerabilities
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service or to execute code...
KDE SC: alter file via metalink
An attacker can invite the victim to use a malicious metalink file with KGet, in order to overwrite a victim's file...

   

Direct access to page 1 21 41 61 81 101 121 141 161 181 201 221 241 261 281 300 301 302 303 304 305 306 307 308 310 312 313 314 315 316 317 318 319 320 321 341 361 381 401 421 441 461 481 501 521 541 561 581 601 621 641 661 681 701 721 741 761 781 801 821 841 861 881 901 921 941 961 981 1001 1021 1023