The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Unix - platform ~ not comprehensive

Libgcrypt: information disclosure via ECDSA Timing Attack
An attacker can bypass access restrictions to data via ECDSA Timing Attack of Libgcrypt, in order to obtain sensitive information. This vulnerability originates from VIGILANCE-VUL-30530...
CVE-2019-13627, DLA-1931-1, DLA-1931-2, openSUSE-SU-2019:2161-1, openSUSE-SU-2020:0022-1, RHSA-2020:4482-01, SUSE-SU-2019:2349-1, SUSE-SU-2019:2510-1, SUSE-SU-2019:3392-1, USN-4236-1, USN-4236-2, USN-4236-3, VIGILANCE-VUL-30205
Intel 64-bit CPU: information disclosure via SWAPGS
A local attacker can read a memory fragment via SWAPGS of Intel 64-bit CPU, in order to obtain sensitive information...
1103505, CERTFR-2019-AVI-375, CERTFR-2019-AVI-376, CERTFR-2019-AVI-381, CERTFR-2019-AVI-390, CERTFR-2019-AVI-391, CERTFR-2019-AVI-392, CERTFR-2019-AVI-417, CERTFR-2019-AVI-418, CERTFR-2019-AVI-428, CERTFR-2019-AVI-440, CERTFR-2019-AVI-458, CERTFR-2019-AVI-467, CERTFR-2019-AVI-486, CVE-2019-1125, DLA-1884-1, DLA-1885-1, DSA-4495-1, DSA-4497-1, FEDORA-2019-6bda4c81f4, FEDORA-2019-e37c348348, JSA10993, K31085564, openSUSE-SU-2019:1923-1, openSUSE-SU-2019:1924-1, RHSA-2019:2405-01, RHSA-2019:2411-01, RHSA-2019:2473-01, RHSA-2019:2476-01, RHSA-2019:2600-01, RHSA-2019:2609-01, RHSA-2019:2695-01, RHSA-2019:2696-01, RHSA-2019:2730-01, RHSA-2019:2899-01, RHSA-2019:2900-01, RHSA-2019:2975-01, RHSA-2019:3220-01, SB10297, SSA:2019-226-01, SSB-439005, STORM-2019-007, SUSE-SU-2019:14157-1, SUSE-SU-2019:2068-1, SUSE-SU-2019:2069-1, SUSE-SU-2019:2070-1, SUSE-SU-2019:2071-1, SUSE-SU-2019:2072-1, SUSE-SU-2019:2073-1, SUSE-SU-2019:2262-1, SUSE-SU-2019:2263-1, SUSE-SU-2019:2299-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SWAPGS, Synology-SA-19:32, USN-4093-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4096-1, VIGILANCE-VUL-29962
libslirp: buffer overflow via ip_reass
An attacker can trigger a buffer overflow via ip_reass() of libslirp, in order to trigger a denial of service, and possibly to run code...
CVE-2019-14378, DLA-1927-1, DSA-4506-1, DSA-4512-1, FEDORA-2019-77bafc4454, JSA11110, openSUSE-SU-2019:2041-1, openSUSE-SU-2019:2059-1, openSUSE-SU-2019:2510-1, RHSA-2019:3403-01, RHSA-2019:3494-01, RHSA-2019:3968-01, RHSA-2020:0366-01, RHSA-2020:0775-01, RHSA-2020:0889-01, RHSA-2020:2065-01, RHSA-2020:2126-01, SUSE-SU-2019:14151-1, SUSE-SU-2019:2157-1, SUSE-SU-2019:2192-1, SUSE-SU-2019:2221-1, SUSE-SU-2019:2246-1, SUSE-SU-2019:2353-1, SUSE-SU-2019:2783-1, SUSE-SU-2019:2955-1, SUSE-SU-2020:0388-1, USN-4191-1, USN-4191-2, VIGILANCE-VUL-29926
GNU patch: code execution via src/pch.c
An attacker can use a vulnerability via src/pch.c of GNU patch, in order to run code...
CERTFR-2019-AVI-451, CVE-2019-13638, DLA-1864-1, DSA-4489-1, FEDORA-2019-ac709da87f, RHSA-2019:2798-01, RHSA-2019:2964-01, RHSA-2019:3757-01, RHSA-2019:3758-01, RHSA-2019:4061-01, USN-4071-1, USN-4071-2, VIGILANCE-VUL-29882
Pivotal Cloud Foundry BOSH Backup and Restore CLI: information disclosure via Job Metadata File
An attacker can bypass access restrictions to data via Job Metadata File of Pivotal Cloud Foundry BOSH Backup and Restore CLI, in order to obtain sensitive information...
CVE-2019-3786, VIGILANCE-VUL-29834
FileZilla Client: code execution via Double-quotation Marks
An attacker can use a vulnerability via Double-quotation Marks of FileZilla Client, in order to run code...
FEDORA-2019-6e77507660, FEDORA-2019-7b9af09b17, VIGILANCE-VUL-29698
Python Twisted: information disclosure via URI CRLF
An attacker can bypass access restrictions to data via URI CRLF of Python Twisted, in order to obtain sensitive information...
cpuapr2020, CVE-2019-12387, openSUSE-SU-2019:1760-1, openSUSE-SU-2019:1785-1, RHSA-2020:1091-01, SUSE-SU-2019:1731-1, SUSE-SU-2019:2066-1, USN-4308-1, USN-4308-2, VIGILANCE-VUL-29682
Vim: code execution via Source Commande Modeline
An attacker can use a vulnerability via Source Commande Modeline of Vim, in order to run code...
bulletinjul2019, CERTFR-2019-AVI-267, CVE-2019-12735, DLA-1871-1, DSA-4467-1, DSA-4467-2, DSA-4487-1, FEDORA-2019-d79f89346c, FEDORA-2019-dcd49378b8, JSA10993, K93144355, openSUSE-SU-2019:1551-1, openSUSE-SU-2019:1561-1, openSUSE-SU-2019:1562-1, openSUSE-SU-2019:1759-1, openSUSE-SU-2019:1997-1, RHBUG-1718308, RHSA-2019:1619-01, RHSA-2019:1774-01, RHSA-2019:1793-01, SUSE-SU-2019:14078-1, SUSE-SU-2019:1456-1, SUSE-SU-2019:1457-1, USN-4016-1, USN-4016-2, VIGILANCE-VUL-29493
Enigmail: creation of fake status messages
An attacker can create fake status messages in GnuPG, in order to deceive the victime...
CVE-2018-12019, FEDORA-2018-a4bb79ea75, FEDORA-2018-fd67c19256, openSUSE-SU-2018:1706-1, openSUSE-SU-2018:1708-1, SUSE-SU-2018:2243-1, VIGILANCE-VUL-26424
GnuPG: creation of fake status messages
An attacker can create fake status messages in GnuPG, in order to deceive the victime...
bulletinjul2018, CVE-2018-12020, DSA-2020-030, DSA-4222-1, DSA-4223-1, FEDORA-2018-4ef71d3525, FEDORA-2018-69780fc4d7, FEDORA-2018-a4e13742b4, JSA10917, openSUSE-SU-2018:1706-1, openSUSE-SU-2018:1708-1, openSUSE-SU-2018:1722-1, openSUSE-SU-2018:1724-1, RHSA-2018:2180-01, RHSA-2018:2181-01, SSA:2018-159-01, SSA:2018-170-01, SUSE-SU-2018:1696-1, SUSE-SU-2018:1698-1, SUSE-SU-2018:2243-1, T4012, USN-3675-1, USN-3675-2, USN-3675-3, USN-3964-1, VIGILANCE-VUL-26364
Our database contains other pages. You can request a free trial to read them.