The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Microsoft Windows 8

security threat CVE-2019-9506

Bluetooth BR/EDR: information disclosure via Key Negotiation

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Key Negotiation of Bluetooth BR/EDR, in order to obtain sensitive information.
Severity: 2/4.
Creation date: 14/08/2019.
Identifiers: CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CERTFR-2019-AVI-482, CERTFR-2019-AVI-486, CERTFR-2019-AVI-502, CERTFR-2019-AVI-503, CERTFR-2019-AVI-513, CERTFR-2019-AVI-519, CERTFR-2019-AVI-522, CERTFR-2019-AVI-528, CERTFR-2019-AVI-561, CERTFR-2019-AVI-575, cisco-sa-20190813-bluetooth, CVE-2019-9506, DLA-1919-1, DLA-1919-2, DLA-1930-1, HT210346, HT210348, openSUSE-SU-2019:2307-1, openSUSE-SU-2019:2308-1, RHSA-2019:2975-01, RHSA-2019:3055-01, RHSA-2019:3076-01, RHSA-2019:3089-01, RHSA-2019:3165-01, RHSA-2019:3187-01, RHSA-2019:3217-01, RHSA-2019:3218-01, RHSA-2019:3220-01, RHSA-2019:3231-01, RHSA-2019:3309-01, RHSA-2019:3517-01, SUSE-SU-2019:2648-1, SUSE-SU-2019:2651-1, SUSE-SU-2019:2658-1, SUSE-SU-2019:2706-1, SUSE-SU-2019:2710-1, SUSE-SU-2019:2879-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2984-1, Synology-SA-19:33, USN-4115-1, USN-4115-2, USN-4118-1, USN-4147-1, VIGILANCE-VUL-30041.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass access restrictions to data via Key Negotiation of Bluetooth BR/EDR, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

cybersecurity announce CVE-2019-1125

Intel 64-bit CPU: information disclosure via SWAPGS

Synthesis of the vulnerability

A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information.
Severity: 1/4.
Creation date: 07/08/2019.
Identifiers: 1103505, CERTFR-2019-AVI-375, CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-390, CERTFR-2019-AVI-391, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-428, CERTFR-2019-AVI-440, CERTFR-2019-AVI-458, CERTFR-2019-AVI-467, CERTFR-2019-AVI-486, CVE-2019-1125, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, FEDORA-2019-6bda4c81f4, FEDORA-2019-e37c348348, K31085564, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, RHSA-2019:2405-01, RHSA-2019:2411-01, RHSA-2019:2473-01, RHSA-2019:2476-01, RHSA-2019:2600-01, RHSA-2019:2609-01, RHSA-2019:2695-01, RHSA-2019:2696-01, RHSA-2019:2730-01, RHSA-2019:2899-01, RHSA-2019:2900-01, RHSA-2019:2975-01, RHSA-2019:3220-01, SB10297, SSA:2019-226-01, STORM-2019-007, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SWAPGS, Synology-SA-19:32, USN-4093-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4096-1, VIGILANCE-VUL-29962.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

security bulletin CVE-2019-1069

Microsoft Windows: privilege escalation via _SchRpcRegisterTask

Synthesis of the vulnerability

An attacker can bypass restrictions via _SchRpcRegisterTask() of MS-Windows, in order to escalate his privileges.
Severity: 2/4.
Creation date: 22/05/2019.
Identifiers: CVE-2019-1069, VIGILANCE-VUL-29387, VU#119704.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass restrictions via _SchRpcRegisterTask() of MS-Windows, in order to escalate his privileges.

This vulnerability may actually be CVE-2019-0863 (see VIGILANCE-VUL-29301).
Full Vigil@nce bulletin... (Free trial)

cybersecurity bulletin CVE-2018-12126 CVE-2018-12127 CVE-2018-12130

Intel processors: information disclosure via performance measurement

Synthesis of the vulnerability

An attacker can measure performances of his process, in order to get sensitive information about other process or, if the host is virtualized, about other guest systems.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 4.
Creation date: 15/05/2019.
Revision date: 15/05/2019.
Identifiers: 1074268, 1103481, CERTFR-2019-AVI-209, CERTFR-2019-AVI-211, CERTFR-2019-AVI-212, CERTFR-2019-AVI-213, CERTFR-2019-AVI-215, CERTFR-2019-AVI-217, CERTFR-2019-AVI-229, CERTFR-2019-AVI-230, CERTFR-2019-AVI-233, CERTFR-2019-AVI-311, CERTFR-2019-AVI-458, CERTFR-2019-AVI-489, CTX251995, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091, DLA-1787-1, DLA-1789-1, DLA-1789-2, DLA-1799-1, DLA-1799-2, DSA-4444-1, DSA-4447-1, DSA-4447-2, FEDORA-2019-0731828893, FEDORA-2019-1f5832fc0e, FEDORA-2019-640f8d8dd1, FEDORA-2019-6458474bf2, FEDORA-2019-c36afa818c, FEDORA-2019-e6bf55e821, FEDORA-2019-eb08fb0c5f, FG-IR-18-002, FreeBSD-SA-19:07.mds, FreeBSD-SA-19:26.mcu, HPESBHF03933, INTEL-SA-00233, openSUSE-SU-2019:1402-1, openSUSE-SU-2019:1403-1, openSUSE-SU-2019:1404-1, openSUSE-SU-2019:1405-1, openSUSE-SU-2019:1407-1, openSUSE-SU-2019:1408-1, openSUSE-SU-2019:1419-1, openSUSE-SU-2019:1420-1, openSUSE-SU-2019:1468-1, openSUSE-SU-2019:1505-1, openSUSE-SU-2019:1805-1, openSUSE-SU-2019:1806-1, PAN-SA-2019-0012, RHSA-2019:1155-01, RHSA-2019:1167-01, RHSA-2019:1168-01, RHSA-2019:1169-01, RHSA-2019:1170-01, RHSA-2019:1171-01, RHSA-2019:1172-01, RHSA-2019:1174-01, RHSA-2019:1175-01, RHSA-2019:1176-01, RHSA-2019:1177-01, RHSA-2019:1178-01, RHSA-2019:1180-01, RHSA-2019:1181-01, RHSA-2019:1182-01, RHSA-2019:1183-01, RHSA-2019:1184-01, RHSA-2019:1185-01, RHSA-2019:1186-01, RHSA-2019:1187-01, RHSA-2019:1188-01, RHSA-2019:1189-01, RHSA-2019:1190-01, RHSA-2019:1193-01, RHSA-2019:1194-01, RHSA-2019:1195-01, RHSA-2019:1196-01, RHSA-2019:1197-01, RHSA-2019:1198-01, SB10292, SSA-608355, SSA-616472, SUSE-SU-2019:1235-1, SUSE-SU-2019:1236-1, SUSE-SU-2019:1238-1, SUSE-SU-2019:1239-1, SUSE-SU-2019:1240-1, SUSE-SU-2019:1241-1, SUSE-SU-2019:1242-1, SUSE-SU-2019:1243-1, SUSE-SU-2019:1244-1, SUSE-SU-2019:1245-1, SUSE-SU-2019:1248-1, SUSE-SU-2019:1268-1, SUSE-SU-2019:1269-1, SUSE-SU-2019:1272-1, SUSE-SU-2019:1287-1, SUSE-SU-2019:1289-1, SUSE-SU-2019:1296-1, SUSE-SU-2019:1313-1, SUSE-SU-2019:1347-1, SUSE-SU-2019:1348-1, SUSE-SU-2019:1349-1, SUSE-SU-2019:1356-1, SUSE-SU-2019:1371-1, SUSE-SU-2019:14048-1, SUSE-SU-2019:14051-1, SUSE-SU-2019:14052-1, SUSE-SU-2019:14063-1, SUSE-SU-2019:14133-1, SUSE-SU-2019:1423-1, SUSE-SU-2019:1438-1, SUSE-SU-2019:1452-1, SUSE-SU-2019:1490-1, SUSE-SU-2019:1547-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1909-1, SUSE-SU-2019:1910-1, SUSE-SU-2019:1954-1, SUSE-SU-2019:2430-1, Synology-SA-19:24, USN-3977-1, USN-3977-2, USN-3977-3, USN-3978-1, USN-3979-1, USN-3980-1, USN-3981-1, USN-3981-2, USN-3982-1, USN-3982-2, USN-3983-1, USN-3983-2, USN-3984-1, USN-3985-1, USN-3985-2, VIGILANCE-VUL-29300, VMSA-2019-0008, XSA-297, ZombieLoad.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can measure performances of his process, in order to get sensitive information about other process or, if the host is virtualized, about other guest systems.
Full Vigil@nce bulletin... (Free trial)

weakness bulletin CVE-2019-0808

Windows: privilege escalation via win32k-MNGetpItemFromIndex NtUserMNDragOver

Synthesis of the vulnerability

An attacker can bypass restrictions via win32k::MNGetpItemFromIndex NtUserMNDragOver() of Windows, in order to escalate his privileges.
Severity: 2/4.
Creation date: 11/03/2019.
Identifiers: CVE-2019-0808, VIGILANCE-VUL-28702.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass restrictions via win32k::MNGetpItemFromIndex NtUserMNDragOver() of Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

weakness bulletin CVE-2019-7090

Adobe Flash Player: out-of-bounds memory reading

Synthesis of the vulnerability

An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information.
Severity: 2/4.
Creation date: 12/02/2019.
Identifiers: APSB19-06, CERTFR-2019-AVI-057, CVE-2019-7090, RHSA-2019:0348-01, VIGILANCE-VUL-28482.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer weakness note 28108

Windows: privilege escalation via MsiAdvertiseProduct

Synthesis of the vulnerability

An attacker can bypass restrictions via MsiAdvertiseProduct of Windows, in order to escalate his privileges.
Severity: 2/4.
Creation date: 27/12/2018.
Identifiers: VIGILANCE-VUL-28108, VU#228297.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass restrictions via MsiAdvertiseProduct of Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-8256 CVE-2018-8407 CVE-2018-8408

Microsoft Windows: vulnerabilities of November 2018

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 24.
Creation date: 14/11/2018.
Identifiers: CERTFR-2018-AVI-552, CVE-2018-8256, CVE-2018-8407, CVE-2018-8408, CVE-2018-8415, CVE-2018-8417, CVE-2018-8450, CVE-2018-8454, CVE-2018-8471, CVE-2018-8476, CVE-2018-8485, CVE-2018-8544, CVE-2018-8547, CVE-2018-8549, CVE-2018-8550, CVE-2018-8553, CVE-2018-8554, CVE-2018-8561, CVE-2018-8562, CVE-2018-8563, CVE-2018-8565, CVE-2018-8566, CVE-2018-8584, CVE-2018-8589, CVE-2018-8592, VIGILANCE-VUL-27775, ZDI-18-1349, ZDI-18-1357.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

security vulnerability CVE-2018-15978

Adobe Flash Player: out-of-bounds memory reading

Synthesis of the vulnerability

An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information.
Severity: 2/4.
Creation date: 14/11/2018.
Identifiers: APSB18-39, CERTFR-2018-AVI-548, CVE-2018-15978, RHSA-2018:3618-01, VIGILANCE-VUL-27766.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-12037 CVE-2018-12038

SSD drives: information disclosure via Self Encrypting Password Weaknesses

Synthesis of the vulnerability

An attacker can decrypt data of some SSD drives (Crucial, Micron and Samsung were tested), by using either a Master Password or a weakness in the password management.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/11/2018.
Identifiers: ADV180028, CVE-2018-12037, CVE-2018-12038, VIGILANCE-VUL-27724, VU#395981.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can decrypt data of some SSD drives (Crucial, Micron and Samsung were tested), by using either a Master Password or a weakness in the password management.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Microsoft Windows 8: