The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Microsoft Windows 7

Microsoft Windows: four vulnerabilities
An attacker can use several vulnerabilities of Microsoft Windows...
CVE-2020-0915, CVE-2020-0916, CVE-2020-0986, VIGILANCE-VUL-32309, ZDI-20-662, ZDI-20-663, ZDI-20-664, ZDI-20-665, ZDI-20-666
Windows: vulnerabilities of March 2019
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2019-AVI-104, CVE-2019-0603, CVE-2019-0614, CVE-2019-0617, CVE-2019-0682, CVE-2019-0683, CVE-2019-0689, CVE-2019-0690, CVE-2019-0692, CVE-2019-0693, CVE-2019-0694, CVE-2019-0695, CVE-2019-0696, CVE-2019-0697, CVE-2019-0698, CVE-2019-0701, CVE-2019-0702, CVE-2019-0703, CVE-2019-0704, CVE-2019-0726, CVE-2019-0754, CVE-2019-0755, CVE-2019-0756, CVE-2019-0759, CVE-2019-0765, CVE-2019-0766, CVE-2019-0767, CVE-2019-0772, CVE-2019-0774, CVE-2019-0775, CVE-2019-0776, CVE-2019-0782, CVE-2019-0784, CVE-2019-0797, CVE-2019-0808, CVE-2019-0821, DSA-2019-186, VIGILANCE-VUL-28731, ZDI-19-272, ZDI-19-273, ZDI-19-276, ZDI-19-278, ZDI-19-279, ZDI-19-286
Intel Processors: information disclosure via TSX Asynchronous Abort
An attacker can bypass access restrictions to data via TSX Asynchronous Abort of Intel Processors, in order to obtain sensitive information...
6198355, CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-558, CERTFR-2019-AVI-559, CERTFR-2019-AVI-560, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-612, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CERTFR-2020-AVI-056, CTX263684, CVE-2019-11135, DLA-1989-1, DLA-1990-1, DLA-2051-1, DSA-2020-062, DSA-4564-1, DSA-4565-1, DSA-4565-2, DSA-4602-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, FreeBSD-SA-19:26.mcu, HPESBHF03968, INTEL-SA-00270, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2504-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2506-1, openSUSE-SU-2019:2507-1, openSUSE-SU-2019:2509-1, openSUSE-SU-2019:2510-1, openSUSE-SU-2019:2527-1, openSUSE-SU-2019:2528-1, openSUSE-SU-2019:2620-1, openSUSE-SU-2019:2631-1, openSUSE-SU-2019:2710-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3842-01, RHSA-2019:3843-01, RHSA-2019:3844-01, RHSA-2019:3936-01, RHSA-2020:0026-01, RHSA-2020:0028-01, RHSA-2020:0204-01, RHSA-2020:0279-01, RHSA-2020:0366-01, RHSA-2020:0555-01, RHSA-2020:0666-01, SB10306, SSA:2019-320-01, SUSE-SU-2019:14217-1, SUSE-SU-2019:14218-1, SUSE-SU-2019:14220-1, SUSE-SU-2019:2946-1, SUSE-SU-2019:2947-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2951-1, SUSE-SU-2019:2952-1, SUSE-SU-2019:2953-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2019:2957-1, SUSE-SU-2019:2958-1, SUSE-SU-2019:2959-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:2986-1, SUSE-SU-2019:2987-1, SUSE-SU-2019:2988-1, SUSE-SU-2019:3091-1, SUSE-SU-2019:3200-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3340-1, SUSE-SU-2019:3348-1, SUSE-SU-2020:0093-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, SUSE-SU-2020:14444-1, USN-4182-1, USN-4182-2, USN-4182-3, USN-4182-4, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, USN-4187-1, USN-4188-1, VIGILANCE-VUL-30847, VMSA-2019-0020, XSA-305
Intel Processors: denial of service via Machine Check Error On Page Size Change
An attacker, inside a guest system, can trigger a fatal error via Machine Check Error On Page Size Change of Intel Processors, in order to trigger a denial of service on the host system...
CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-558, CERTFR-2019-AVI-559, CERTFR-2019-AVI-560, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CERTFR-2020-AVI-056, CERTFR-2020-AVI-618, cpujul2020, CTX263684, CVE-2018-12207, DLA-1990-1, DSA-4564-1, DSA-4566-1, DSA-4602-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, FreeBSD-SA-19:25.mcepsc, INTEL-SA-00210, K17269881, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2506-1, openSUSE-SU-2019:2507-1, openSUSE-SU-2019:2510-1, openSUSE-SU-2019:2710-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3842-01, RHSA-2019:3843-01, RHSA-2019:3844-01, RHSA-2019:3936-01, RHSA-2020:0026-01, RHSA-2020:0028-01, RHSA-2020:0204-01, STORM-2019-026, SUSE-SU-2019:14218-1, SUSE-SU-2019:2946-1, SUSE-SU-2019:2947-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2951-1, SUSE-SU-2019:2952-1, SUSE-SU-2019:2953-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3340-1, SUSE-SU-2019:3348-1, SUSE-SU-2020:0093-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, SUSE-SU-2020:14444-1, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, VIGILANCE-VUL-30843, VMSA-2019-0020, XSA-304
Microsoft Windows: denial of service via Storage Service
An attacker can trigger a fatal error via Storage Service of Microsoft Windows, in order to trigger a denial of service...
VIGILANCE-VUL-30452, ZDI-19-848
Bluetooth BR/EDR: information disclosure via Key Negotiation
An attacker can bypass access restrictions to data via Key Negotiation of Bluetooth BR/EDR, in order to obtain sensitive information...
CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CERTFR-2019-AVI-482, CERTFR-2019-AVI-486, CERTFR-2019-AVI-502, CERTFR-2019-AVI-503, CERTFR-2019-AVI-513, CERTFR-2019-AVI-519, CERTFR-2019-AVI-522, CERTFR-2019-AVI-528, CERTFR-2019-AVI-561, CERTFR-2019-AVI-575, CERTFR-2019-AVI-612, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CERTFR-2020-AVI-056, CERTFR-2020-AVI-210, cisco-sa-20190813-bluetooth, CVE-2019-9506, DLA-1919-1, DLA-1919-2, DLA-1930-1, HT210346, HT210348, openSUSE-SU-2019:2307-1, openSUSE-SU-2019:2308-1, RHSA-2019:2975-01, RHSA-2019:3055-01, RHSA-2019:3076-01, RHSA-2019:3089-01, RHSA-2019:3165-01, RHSA-2019:3187-01, RHSA-2019:3217-01, RHSA-2019:3218-01, RHSA-2019:3220-01, RHSA-2019:3231-01, RHSA-2019:3309-01, RHSA-2019:3517-01, RHSA-2020:0204-01, RHSA-2020:1460-01, SUSE-SU-2019:2648-1, SUSE-SU-2019:2651-1, SUSE-SU-2019:2658-1, SUSE-SU-2019:2706-1, SUSE-SU-2019:2710-1, SUSE-SU-2019:2879-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:3200-1, SUSE-SU-2019:3295-1, SUSE-SU-2020:0093-1, USN-4115-1, USN-4115-2, USN-4118-1, USN-4147-1, VIGILANCE-VUL-30041
HTTP/2: multiple vulnerabilities
An attacker can use several vulnerabilities of HTTP/2...
1072144, 1072860, 1167160, 6198380, bulletinoct2019, CERTFR-2019-AVI-389, cpuapr2020, cpuoct2020, CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518, DSA-4503-1, DSA-4505-1, DSA-4508-1, DSA-4511-1, DSA-4520-1, DSA-4669-1, FEDORA-2019-1686ae9b59, FEDORA-2019-5a6a7bc12c, FEDORA-2019-63ba15cc83, FEDORA-2019-7443ebda4b, FEDORA-2019-81985a8858, FEDORA-2019-8a437d5c2f, FEDORA-2019-befd924cfe, HT210436, NFLX-2019-002, openSUSE-SU-2019:2000-1, openSUSE-SU-2019:2051-1, openSUSE-SU-2019:2056-1, openSUSE-SU-2019:2072-1, openSUSE-SU-2019:2085-1, openSUSE-SU-2019:2114-1, openSUSE-SU-2019:2115-1, openSUSE-SU-2019:2120-1, openSUSE-SU-2019:2130-1, openSUSE-SU-2019:2232-1, openSUSE-SU-2019:2234-1, openSUSE-SU-2019:2264-1, RHSA-2019:2692-01, RHSA-2019:2726-01, RHSA-2019:2745-01, RHSA-2019:2746-01, RHSA-2019:2775-01, RHSA-2019:2799-01, RHSA-2019:2893-01, RHSA-2019:2925-01, RHSA-2019:2939-01, RHSA-2019:2949-01, RHSA-2019:2955-01, RHSA-2019:4018-01, RHSA-2019:4019-01, RHSA-2019:4020-01, RHSA-2019:4021-01, RHSA-2019:4040-01, RHSA-2019:4041-01, RHSA-2019:4042-01, RHSA-2019:4045-01, RHSA-2019:4269-01, RHSA-2019:4273-01, RHSA-2020:0406-01, SSA:2020-091-02, SUSE-SU-2019:2213-1, SUSE-SU-2019:2214-1, SUSE-SU-2019:2237-1, SUSE-SU-2019:2254-1, SUSE-SU-2019:2259-1, SUSE-SU-2019:2260-1, SUSE-SU-2019:2309-1, SUSE-SU-2019:2329-1, SUSE-SU-2019:2473-1, SUSE-SU-2019:2559-1, SUSE-SU-2020:0059-1, Synology-SA-19:33, Synology-SA-19:37, USN-4099-1, USN-4113-1, USN-4113-2, USN-4308-1, VIGILANCE-VUL-30040, VU#605641
Intel 64-bit CPU: information disclosure via SWAPGS
A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information...
1103505, CERTFR-2019-AVI-375, CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-390, CERTFR-2019-AVI-391, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-428, CERTFR-2019-AVI-440, CERTFR-2019-AVI-458, CERTFR-2019-AVI-467, CERTFR-2019-AVI-486, CVE-2019-1125, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, FEDORA-2019-6bda4c81f4, FEDORA-2019-e37c348348, JSA10993, K31085564, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, RHSA-2019:2405-01, RHSA-2019:2411-01, RHSA-2019:2473-01, RHSA-2019:2476-01, RHSA-2019:2600-01, RHSA-2019:2609-01, RHSA-2019:2695-01, RHSA-2019:2696-01, RHSA-2019:2730-01, RHSA-2019:2899-01, RHSA-2019:2900-01, RHSA-2019:2975-01, RHSA-2019:3220-01, SB10297, SSA:2019-226-01, SSB-439005, STORM-2019-007, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SWAPGS, Synology-SA-19:32, USN-4093-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4096-1, VIGILANCE-VUL-29962
Microsoft Windows: vulnerabilities of April 2019
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2019-AVI-158, CVE-2019-0685, CVE-2019-0688, CVE-2019-0730, CVE-2019-0731, CVE-2019-0732, CVE-2019-0735, CVE-2019-0786, CVE-2019-0790, CVE-2019-0791, CVE-2019-0792, CVE-2019-0793, CVE-2019-0794, CVE-2019-0795, CVE-2019-0796, CVE-2019-0802, CVE-2019-0803, CVE-2019-0805, CVE-2019-0814, CVE-2019-0836, CVE-2019-0837, CVE-2019-0838, CVE-2019-0839, CVE-2019-0840, CVE-2019-0841, CVE-2019-0842, CVE-2019-0844, CVE-2019-0845, CVE-2019-0846, CVE-2019-0847, CVE-2019-0848, CVE-2019-0849, CVE-2019-0851, CVE-2019-0853, CVE-2019-0856, CVE-2019-0859, CVE-2019-0877, CVE-2019-0879, FG-VD-19-004, VIGILANCE-VUL-28991
Microsoft Windows: privilege escalation via _SchRpcRegisterTask
An attacker can bypass restrictions via _SchRpcRegisterTask() of MS-Windows, in order to escalate his privileges...
CVE-2019-1069, VIGILANCE-VUL-29387, VU#119704
Our database contains other pages. You can request a free trial to read them.

Display information about Microsoft Windows 7: