The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Unix (platform) ~ not comprehensive

Cryptacular: denial of service via CiphertextHeader Decode Operation
An attacker can trigger a fatal error via CiphertextHeader Decode Operation of Cryptacular, in order to trigger a denial of service...
52, CVE-2020-7226, VIGILANCE-VUL-31437
TigerVNC: multiple vulnerabilities
An attacker can use several vulnerabilities of TigerVNC...
CVE-2019-15690, CVE-2019-15691, CVE-2019-15692, CVE-2019-15693, CVE-2019-15694, CVE-2019-15695, DLA-2146-1, openSUSE-SU-2020:0087-1, RHSA-2020:0913-01, RHSA-2020:0920-01, RHSA-2020:0921-01, SSA:2019-354-02, SUSE-SU-2020:0112-1, SUSE-SU-2020:0113-1, SUSE-SU-2020:0159-1, SUSE-SU-2020:0266-1, VIGILANCE-VUL-31231
Intel CSME/AMT/DAL/SPS/TXE: multiple vulnerabilities
An attacker can use several vulnerabilities of Intel CSME...
000017943, CVE-2019-0131, CVE-2019-0165, CVE-2019-0166, CVE-2019-0168, CVE-2019-0169, CVE-2019-11086, CVE-2019-11087, CVE-2019-11088, CVE-2019-11090, CVE-2019-11097, CVE-2019-11100, CVE-2019-11101, CVE-2019-11102, CVE-2019-11103, CVE-2019-11104, CVE-2019-11105, CVE-2019-11106, CVE-2019-11107, CVE-2019-11108, CVE-2019-11109, CVE-2019-11110, CVE-2019-11131, CVE-2019-11132, CVE-2019-11147, HPESBHF03963, K54164678, SSA-398519, VIGILANCE-VUL-31014
Bash: buffer overflow via Wide Characters Echo
An attacker can trigger a buffer overflow via Wide Characters Echo of Bash, in order to trigger a denial of service, and possibly to run code...
CVE-2012-6711, K05122252, SUSE-SU-2019:2976-1, USN-4180-1, VIGILANCE-VUL-30548
Intel PROSet/Wireless WiFi Software: denial of service
An attacker can trigger a fatal error of Intel PROSet/Wireless WiFi Software, in order to trigger a denial of service...
CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CERTFR-2019-AVI-478, CERTFR-2019-AVI-482, CVE-2019-0136, DLA-1919-1, DLA-1919-2, DLA-1930-1, INTEL-SA-00232, USN-4115-1, USN-4115-2, USN-4118-1, USN-4145-1, USN-4147-1, VIGILANCE-VUL-30330
Intel Xeon: information disclosure via DDIO NetCAT
An attacker can bypass access restrictions to data via DDIO NetCAT of Intel Xeon, in order to obtain sensitive information...
CERTFR-2019-AVI-430, CVE-2019-11184, INTEL-SA-00290, VIGILANCE-VUL-30310
Libgcrypt: information disclosure via ECDSA Timing Attack
An attacker can bypass access restrictions to data via ECDSA Timing Attack of Libgcrypt, in order to obtain sensitive information. This vulnerability originates from VIGILANCE-VUL-30530...
CVE-2019-13627, DLA-1931-1, DLA-1931-2, openSUSE-SU-2019:2161-1, openSUSE-SU-2020:0022-1, SUSE-SU-2019:2349-1, SUSE-SU-2019:2510-1, SUSE-SU-2019:3392-1, USN-4236-1, USN-4236-2, USN-4236-3, VIGILANCE-VUL-30205
Intel 64-bit CPU: information disclosure via SWAPGS
A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information...
1103505, CERTFR-2019-AVI-375, CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-390, CERTFR-2019-AVI-391, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-428, CERTFR-2019-AVI-440, CERTFR-2019-AVI-458, CERTFR-2019-AVI-467, CERTFR-2019-AVI-486, CVE-2019-1125, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, FEDORA-2019-6bda4c81f4, FEDORA-2019-e37c348348, JSA10993, K31085564, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, RHSA-2019:2405-01, RHSA-2019:2411-01, RHSA-2019:2473-01, RHSA-2019:2476-01, RHSA-2019:2600-01, RHSA-2019:2609-01, RHSA-2019:2695-01, RHSA-2019:2696-01, RHSA-2019:2730-01, RHSA-2019:2899-01, RHSA-2019:2900-01, RHSA-2019:2975-01, RHSA-2019:3220-01, SB10297, SSA:2019-226-01, SSB-439005, STORM-2019-007, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SWAPGS, Synology-SA-19:32, USN-4093-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4096-1, VIGILANCE-VUL-29962
Pivotal Cloud Foundry BOSH Backup and Restore CLI: information disclosure via Job Metadata File
An attacker can bypass access restrictions to data via Job Metadata File of Pivotal Cloud Foundry BOSH Backup and Restore CLI, in order to obtain sensitive information...
CVE-2019-3786, VIGILANCE-VUL-29834
FileZilla Client: code execution via Double-quotation Marks
An attacker can use a vulnerability via Double-quotation Marks of FileZilla Client, in order to run code...
FEDORA-2019-6e77507660, FEDORA-2019-7b9af09b17, VIGILANCE-VUL-29698
Our database contains other pages. You can request a free trial to read them.