The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. |
|
 |
|
|
Computer vulnerabilities of Unix - platform ~ not comprehensive
Libgcrypt: information disclosure via ECDSA Timing Attack
An attacker can bypass access restrictions to data via ECDSA Timing Attack of Libgcrypt, in order to obtain sensitive information. This vulnerability originates from VIGILANCE-VUL-30530...
CVE-2019-13627, DLA-1931-1, DLA-1931-2, openSUSE-SU-2019:2161-1, openSUSE-SU-2020:0022-1, RHSA-2020:4482-01, SUSE-SU-2019:2349-1, SUSE-SU-2019:2510-1, SUSE-SU-2019:3392-1, USN-4236-1, USN-4236-2, USN-4236-3, VIGILANCE-VUL-30205 |
Intel 64-bit CPU: information disclosure via SWAPGS
A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information...
1103505, CERTFR-2019-AVI-375, CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-390, CERTFR-2019-AVI-391, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-428, CERTFR-2019-AVI-440, CERTFR-2019-AVI-458, CERTFR-2019-AVI-467, CERTFR-2019-AVI-486, CVE-2019-1125, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, FEDORA-2019-6bda4c81f4, FEDORA-2019-e37c348348, JSA10993, K31085564, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, RHSA-2019:2405-01, RHSA-2019:2411-01, RHSA-2019:2473-01, RHSA-2019:2476-01, RHSA-2019:2600-01, RHSA-2019:2609-01, RHSA-2019:2695-01, RHSA-2019:2696-01, RHSA-2019:2730-01, RHSA-2019:2899-01, RHSA-2019:2900-01, RHSA-2019:2975-01, RHSA-2019:3220-01, SB10297, SSA:2019-226-01, SSB-439005, STORM-2019-007, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SWAPGS, Synology-SA-19:32, USN-4093-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4096-1, VIGILANCE-VUL-29962 |
libslirp: buffer overflow via ip_reass
An attacker can trigger a buffer overflow via ip_reass() of libslirp, in order to trigger a denial of service, and possibly to run code...
CVE-2019-14378, DLA-1927-1, DSA-4506-1, DSA-4512-1, FEDORA-2019-77bafc4454, JSA11110, openSUSE-SU-2019:2041-1, openSUSE-SU-2019:2059-1, openSUSE-SU-2019:2510-1, RHSA-2019:3403-01, RHSA-2019:3494-01, RHSA-2019:3968-01, RHSA-2020:0366-01, RHSA-2020:0775-01, RHSA-2020:0889-01, RHSA-2020:2065-01, RHSA-2020:2126-01, SUSE-SU-2019:14151-1, SUSE-SU-2019:2157-1, SUSE-SU-2019:2192-1, SUSE-SU-2019:2221-1, SUSE-SU-2019:2246-1, SUSE-SU-2019:2353-1, SUSE-SU-2019:2783-1, SUSE-SU-2019:2955-1, SUSE-SU-2020:0388-1, USN-4191-1, USN-4191-2, VIGILANCE-VUL-29926 |
GNU patch: code execution via src/pch.c
An attacker can use a vulnerability via src/pch.c of GNU patch, in order to run code...
CERTFR-2019-AVI-451, CVE-2019-13638, DLA-1864-1, DSA-4489-1, FEDORA-2019-ac709da87f, RHSA-2019:2798-01, RHSA-2019:2964-01, RHSA-2019:3757-01, RHSA-2019:3758-01, RHSA-2019:4061-01, USN-4071-1, USN-4071-2, VIGILANCE-VUL-29882 |
Python Twisted: information disclosure via URI CRLF
An attacker can bypass access restrictions to data via URI CRLF of Python Twisted, in order to obtain sensitive information...
cpuapr2020, CVE-2019-12387, openSUSE-SU-2019:1760-1, openSUSE-SU-2019:1785-1, RHSA-2020:1091-01, SUSE-SU-2019:1731-1, SUSE-SU-2019:2066-1, USN-4308-1, USN-4308-2, VIGILANCE-VUL-29682 |
Vim: code execution via Source Commande Modeline
An attacker can use a vulnerability via Source Commande Modeline of Vim, in order to run code...
bulletinjul2019, CERTFR-2019-AVI-267, CVE-2019-12735, DLA-1871-1, DSA-4467-1, DSA-4467-2, DSA-4487-1, FEDORA-2019-d79f89346c, FEDORA-2019-dcd49378b8, JSA10993, K93144355, openSUSE-SU-2019:1551-1, openSUSE-SU-2019:1561-1, openSUSE-SU-2019:1562-1, openSUSE-SU-2019:1759-1, openSUSE-SU-2019:1997-1, RHBUG-1718308, RHSA-2019:1619-01, RHSA-2019:1774-01, RHSA-2019:1793-01, SUSE-SU-2019:14078-1, SUSE-SU-2019:1456-1, SUSE-SU-2019:1457-1, USN-4016-1, USN-4016-2, VIGILANCE-VUL-29493 |
GnuPG: creation of fake status messages
An attacker can create fake status messages in GnuPG, in order to deceive the victime...
bulletinjul2018, CVE-2018-12020, DSA-2020-030, DSA-4222-1, DSA-4223-1, FEDORA-2018-4ef71d3525, FEDORA-2018-69780fc4d7, FEDORA-2018-a4e13742b4, JSA10917, openSUSE-SU-2018:1706-1, openSUSE-SU-2018:1708-1, openSUSE-SU-2018:1722-1, openSUSE-SU-2018:1724-1, RHSA-2018:2180-01, RHSA-2018:2181-01, SSA:2018-159-01, SSA:2018-170-01, SUSE-SU-2018:1696-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:2243-1, T4012, USN-3675-1, USN-3675-2, USN-3675-3, USN-3964-1, VIGILANCE-VUL-26364 |
Our database contains other pages. You can request a free trial to read them.
|