The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Unix (platform) ~ not comprehensive

crewjam/saml: privilege escalation via XML Round-Trip Unpreserved Semantics
An attacker can bypass restrictions via XML Round-Trip Unpreserved Semantics of crewjam/saml, in order to escalate his privileges...
29875, CVE-2020-27846, FEDORA-2020-64e54abd9f, FEDORA-2020-968067abfa, GHSA-4hq8-gmxx-h6w9, VIGILANCE-VUL-34238
Go: read-write access via encoding/xml Round-Trip Unpreserved Semantics
An attacker can bypass access restrictions via encoding/xml Round-Trip Unpreserved Semantics of Go, in order to read or alter data...
CVE-2020-29509, CVE-2020-29510, CVE-2020-29511, VIGILANCE-VUL-34194
WebKitGTK, WPE WebKit: use after free
An attacker can force the usage of a freed memory area of WebKitGTK, WPE WebKit, in order to trigger a denial of service, and possibly to run code...
CVE-2020-13584, DSA-4797-1, DSA-4797-2, FEDORA-2020-145877bcd3, FEDORA-2020-e8a7566e80, openSUSE-SU-2020:2304-1, openSUSE-SU-2020:2310-1, SUSE-SU-2020:3864-1, SUSE-SU-2020:3867-1, VIGILANCE-VUL-33958, WSA-2020-0008
GnuTLS: NULL pointer dereference via Second Handshake No_renegotiation
An attacker can force a NULL pointer to be dereferenced via Second Handshake No_renegotiation of GnuTLS, in order to trigger a denial of service...
CVE-2020-24659, FEDORA-2020-0ab6656303, FEDORA-2020-30cd8d9ad6, FEDORA-2020-4246288e21, GNUTLS-SA-2020-09-04, openSUSE-SU-2020:1724-1, openSUSE-SU-2020:1743-1, RHSA-2020:5483-01, SSA:2020-248-01, SUSE-SU-2020:2864-1, SUSE-SU-2020:2988-1, USN-4491-1, VIGILANCE-VUL-33260
Django: two vulnerabilities
An attacker can use several vulnerabilities of Django...
bulletinoct2020, CVE-2020-24583, CVE-2020-24584, FEDORA-2020-6941c0a65b, USN-4479-1, VIGILANCE-VUL-33204
X.Org Xserver Extensions: four vulnerabilities
An attacker can use several vulnerabilities of X.Org Xserver Extensions...
CVE-2020-14345, CVE-2020-14346, CVE-2020-14361, CVE-2020-14362, DLA-2359-1, DSA-4758-1, openSUSE-SU-2020:1279-1, openSUSE-SU-2020:1302-1, openSUSE-SU-2020:1374-1, openSUSE-SU-2020:1376-1, RHSA-2020:4910-01, RHSA-2020:4953-01, SUSE-SU-2020:14463-1, SUSE-SU-2020:14475-1, SUSE-SU-2020:2240-1, SUSE-SU-2020:2241-1, SUSE-SU-2020:2242-1, SUSE-SU-2020:2325-1, SUSE-SU-2020:2326-1, SUSE-SU-2020:2331-1, SUSE-SU-2020:2398-1, SUSE-SU-2020:2399-1, SUSE-SU-2020:2401-1, SUSE-SU-2020:2407-1, SUSE-SU-2020:2452-1, SUSE-SU-2020:2481-1, USN-4488-1, USN-4488-2, USN-4490-1, VIGILANCE-VUL-33145
GRUB2: integer overflow via Initrd Size Handling
An attacker can trigger an integer overflow via Initrd Size Handling of GRUB2, in order to trigger a denial of service, and possibly to run code...
ADV200011, CERTFR-2020-AVI-475, CERTFR-2020-AVI-476, CERTFR-2020-AVI-477, CERTFR-2020-AVI-485, CVE-2020-15707, DSA-4735-1, DSA-4735-2, FEDORA-2020-41e57d7649, FEDORA-2020-e19b87f4f5, JSA11174, JSA11176, openSUSE-SU-2020:1168-1, openSUSE-SU-2020:1169-1, RHSA-2020:3216-01, RHSA-2020:3217-01, RHSA-2020:3223-01, RHSA-2020:3227-01, RHSA-2020:3271-01, RHSA-2020:3273-01, RHSA-2020:3274-01, RHSA-2020:3275-01, RHSA-2020:3276-01, SUSE-SU-2020:14440-1, SUSE-SU-2020:2073-1, SUSE-SU-2020:2074-1, SUSE-SU-2020:2076-1, SUSE-SU-2020:2077-1, SUSE-SU-2020:2078-1, SUSE-SU-2020:2079-1, USN-4432-1, USN-4432-2, VIGILANCE-VUL-32958
GRUB2: use after free via Function Redefininition
An attacker can force the usage of a freed memory area via Function Redefininition of GRUB2, in order to trigger a denial of service, and possibly to run code...
ADV200011, CERTFR-2020-AVI-475, CERTFR-2020-AVI-476, CERTFR-2020-AVI-477, CERTFR-2020-AVI-485, CVE-2020-15706, DSA-4735-1, DSA-4735-2, FEDORA-2020-41e57d7649, FEDORA-2020-e19b87f4f5, JSA11174, JSA11176, openSUSE-SU-2020:1168-1, openSUSE-SU-2020:1169-1, RHSA-2020:3216-01, RHSA-2020:3217-01, RHSA-2020:3223-01, RHSA-2020:3227-01, RHSA-2020:3271-01, RHSA-2020:3273-01, RHSA-2020:3274-01, RHSA-2020:3275-01, RHSA-2020:3276-01, SUSE-SU-2020:14440-1, SUSE-SU-2020:2073-1, SUSE-SU-2020:2074-1, SUSE-SU-2020:2076-1, SUSE-SU-2020:2077-1, SUSE-SU-2020:2078-1, SUSE-SU-2020:2079-1, USN-4432-1, USN-4432-2, VIGILANCE-VUL-32957
GRUB2: code execution via Unsigned Kernels Loading Without Shim
An attacker can use a vulnerability via Unsigned Kernels Loading Without Shim of GRUB2, in order to run code...
ADV200011, CERTFR-2020-AVI-476, CERTFR-2020-AVI-477, CERTFR-2020-AVI-485, CVE-2020-15705, FEDORA-2020-41e57d7649, FEDORA-2020-e19b87f4f5, JSA11174, JSA11176, openSUSE-SU-2020:1280-1, openSUSE-SU-2020:1282-1, RHSA-2020:3216-01, RHSA-2020:3217-01, RHSA-2020:3223-01, RHSA-2020:3227-01, RHSA-2020:3271-01, RHSA-2020:3273-01, RHSA-2020:3274-01, RHSA-2020:3275-01, RHSA-2020:3276-01, SUSE-SU-2020:14461-1, SUSE-SU-2020:2303-1, SUSE-SU-2020:2304-1, SUSE-SU-2020:2305-1, SUSE-SU-2020:2306-1, SUSE-SU-2020:2307-1, SUSE-SU-2020:2308-1, USN-4432-1, USN-4432-2, VIGILANCE-VUL-32956
GRUB2: integer overflow via grub_ext2_read_link
An attacker can trigger an integer overflow via grub_ext2_read_link() of GRUB2, in order to trigger a denial of service, and possibly to run code...
ADV200011, CERTFR-2020-AVI-475, CERTFR-2020-AVI-476, CERTFR-2020-AVI-477, CERTFR-2020-AVI-485, CVE-2020-14311, DSA-4735-1, DSA-4735-2, FEDORA-2020-41e57d7649, FEDORA-2020-e19b87f4f5, JSA11174, JSA11176, openSUSE-SU-2020:1168-1, openSUSE-SU-2020:1169-1, RHSA-2020:3216-01, RHSA-2020:3217-01, RHSA-2020:3223-01, RHSA-2020:3227-01, RHSA-2020:3271-01, RHSA-2020:3273-01, RHSA-2020:3274-01, RHSA-2020:3275-01, RHSA-2020:3276-01, SUSE-SU-2020:14440-1, SUSE-SU-2020:2073-1, SUSE-SU-2020:2074-1, SUSE-SU-2020:2076-1, SUSE-SU-2020:2077-1, SUSE-SU-2020:2078-1, SUSE-SU-2020:2079-1, USN-4432-1, USN-4432-2, VIGILANCE-VUL-32955
Our database contains other pages. You can request a free trial to read them.