The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Microsoft Windows Server 2012

cybersecurity vulnerability CVE-2018-3665

Intel Microprocessors: information disclosure via Lazy FP State Restore

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Lazy FP State Restore of Intel Microprocessors, in order to obtain sensitive information.
Severity: 2/4.
Creation date: 14/06/2018.
Identifiers: ADV180016, CERTFR-2018-AVI-290, CERTFR-2018-AVI-292, CERTFR-2018-AVI-295, CERTFR-2018-AVI-296, CERTFR-2018-AVI-299, CERTFR-2018-AVI-301, CERTFR-2018-AVI-308, CERTFR-2018-AVI-312, CERTFR-2018-AVI-319, CERTFR-2018-AVI-321, CERTFR-2018-AVI-330, CERTFR-2018-AVI-584, CTX235745, CVE-2018-3665, DLA-1422-1, DLA-1422-2, DSA-4232-1, FEDORA-2018-d3cb6f113c, FG-IR-18-002, FreeBSD-SA-18:07.lazyfpu, HT208937, ibm10742755, INTEL-SA-00145, JSA10917, K21344224, openSUSE-SU-2018:1773-1, openSUSE-SU-2018:2116-1, openSUSE-SU-2018:2211-1, RHSA-2018:1852-01, RHSA-2018:1944-01, RHSA-2018:2164-01, RHSA-2018:2165-01, RHSA-2019:1170-01, RHSA-2019:1190-01, SUSE-SU-2018:1761-1, SUSE-SU-2018:1762-1, SUSE-SU-2018:1772-1, SUSE-SU-2018:1816-1, SUSE-SU-2018:1821-1, SUSE-SU-2018:1846-1, SUSE-SU-2018:1849-1, SUSE-SU-2018:1855-1, SUSE-SU-2018:1981-1, SUSE-SU-2018:2037-1, SUSE-SU-2018:2056-1, SUSE-SU-2018:2059-1, SUSE-SU-2018:2069-1, SUSE-SU-2018:2081-1, SUSE-SU-2018:2528-1, Synology-SA-18:31, USN-3696-1, USN-3696-2, USN-3698-1, USN-3698-2, VIGILANCE-VUL-26423, XSA-267.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass access restrictions to data via Lazy FP State Restore of Intel Microprocessors, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

weakness bulletin CVE-2018-0824 CVE-2018-0854 CVE-2018-0958

Windows: vulnerabilities of May 2018

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 21.
Creation date: 09/05/2018.
Identifiers: CERTFR-2018-AVI-221, CVE-2018-0824, CVE-2018-0854, CVE-2018-0958, CVE-2018-0959, CVE-2018-0961, CVE-2018-8120, CVE-2018-8124, CVE-2018-8127, CVE-2018-8129, CVE-2018-8132, CVE-2018-8134, CVE-2018-8136, CVE-2018-8141, CVE-2018-8142, CVE-2018-8164, CVE-2018-8165, CVE-2018-8166, CVE-2018-8167, CVE-2018-8170, CVE-2018-8174, CVE-2018-8897, VIGILANCE-VUL-26062, ZDI-18-427, ZDI-18-540, ZDI-18-572, ZDI-18-573, ZDI-18-591, ZDI-18-592.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

weakness note CVE-2018-4944

Adobe Flash Player: code execution

Synthesis of the vulnerability

An attacker can use a vulnerability of Adobe Flash Player, in order to run code.
Severity: 4/4.
Creation date: 09/05/2018.
Identifiers: APSB18-16, CERTFR-2018-AVI-217, CVE-2018-4944, RHSA-2018:1367-01, VIGILANCE-VUL-26057.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use a vulnerability of Adobe Flash Player, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer weakness alert CVE-2018-4932 CVE-2018-4933 CVE-2018-4934

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 6.
Creation date: 11/04/2018.
Identifiers: APSB18-08, CERTFR-2018-AVI-176, CVE-2018-4932, CVE-2018-4933, CVE-2018-4934, CVE-2018-4935, CVE-2018-4936, CVE-2018-4937, RHSA-2018:1119-01, VIGILANCE-VUL-25834.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-0887 CVE-2018-0890 CVE-2018-0956

Windows: vulnerabilities of April 2018

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 29.
Creation date: 11/04/2018.
Identifiers: CERTFR-2018-AVI-180, CVE-2018-0887, CVE-2018-0890, CVE-2018-0956, CVE-2018-0957, CVE-2018-0960, CVE-2018-0963, CVE-2018-0964, CVE-2018-0966, CVE-2018-0967, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975, CVE-2018-0976, CVE-2018-1003, CVE-2018-1004, CVE-2018-1008, CVE-2018-1009, CVE-2018-1010, CVE-2018-1012, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016, CVE-2018-1035, CVE-2018-8116, VIGILANCE-VUL-25831, ZDI-18-291, ZDI-18-293, ZDI-18-294, ZDI-18-295, ZDI-18-296, ZDI-18-297.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2018-0986

Microsoft Malware Protection Engine: memory corruption

Synthesis of the vulnerability

An attacker can generate a memory corruption of Microsoft Malware Protection Engine, in order to trigger a denial of service, and possibly to run code.
Severity: 4/4.
Creation date: 04/04/2018.
Identifiers: CERTFR-2018-AVI-168, CERTFR-2018-AVI-169, CVE-2018-0986, VIGILANCE-VUL-25766.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can generate a memory corruption of Microsoft Malware Protection Engine, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

security weakness CVE-2018-0811 CVE-2018-0813 CVE-2018-0814

Windows: vulnerabilities of March 2018

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 30.
Creation date: 14/03/2018.
Identifiers: 1428, 1458, 1462, 1469, 1472, 1475, 1478, 1479, 1480, 1484, 1495, CERTFR-2018-AVI-131, CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0815, CVE-2018-0816, CVE-2018-0817, CVE-2018-0868, CVE-2018-0877, CVE-2018-0878, CVE-2018-0880, CVE-2018-0881, CVE-2018-0882, CVE-2018-0883, CVE-2018-0884, CVE-2018-0885, CVE-2018-0886, CVE-2018-0888, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901, CVE-2018-0902, CVE-2018-0904, CVE-2018-0926, CVE-2018-0977, CVE-2018-0983, openSUSE-SU-2019:0325-1, VIGILANCE-VUL-25544, ZDI-18-242, ZDI-18-243, ZDI-18-244, ZDI-18-245, ZDI-18-246, ZDI-18-248.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

computer weakness announce CVE-2018-4919 CVE-2018-4920

Adobe Flash Player: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 14/03/2018.
Identifiers: APSB18-05, CERTFR-2018-AVI-127, CVE-2018-4919, CVE-2018-4920, RHSA-2018:0520-01, VIGILANCE-VUL-25538.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2018-4877 CVE-2018-4878

Adobe Flash Player: use after free

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area of Adobe Flash Player, in order to trigger a denial of service, and possibly to run code.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 07/02/2018.
Revision date: 26/02/2018.
Identifiers: APSB18-03, CERTFR-2018-AVI-071, CERTFR-2018-AVI-072, CVE-2018-4877, CVE-2018-4878, RHSA-2018:0285-01, VIGILANCE-VUL-25234, ZDI-18-178.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can force the usage of a freed memory area of Adobe Flash Player, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-0742 CVE-2018-0755 CVE-2018-0756

Microsoft Windows: vulnerabilities of February 2018

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 27.
Creation date: 14/02/2018.
Revisions dates: 21/02/2018, 22/02/2018.
Identifiers: 1422, 1423, 1425, 1428, 1432, 1439, 1485, CERTFR-2018-AVI-087, CVE-2018-0742, CVE-2018-0755, CVE-2018-0756, CVE-2018-0757, CVE-2018-0760, CVE-2018-0761, CVE-2018-0809, CVE-2018-0810, CVE-2018-0820, CVE-2018-0821, CVE-2018-0822, CVE-2018-0823, CVE-2018-0825, CVE-2018-0826, CVE-2018-0827, CVE-2018-0828, CVE-2018-0829, CVE-2018-0830, CVE-2018-0831, CVE-2018-0832, CVE-2018-0833, CVE-2018-0842, CVE-2018-0843, CVE-2018-0844, CVE-2018-0846, CVE-2018-0847, CVE-2018-0855, VIGILANCE-VUL-25294, ZDI-18-163, ZDI-18-164, ZDI-18-166, ZDI-18-196, ZDI-18-240.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.