The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Vista

security weakness CVE-2017-3058 CVE-2017-3059 CVE-2017-3060

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 7.
Creation date: 12/04/2017.
Revisions dates: 12/04/2017, 17/05/2017.
Identifiers: 1174, 1211, APSB17-10, CERTFR-2017-AVI-105, CVE-2017-3058, CVE-2017-3059, CVE-2017-3060, CVE-2017-3061, CVE-2017-3062, CVE-2017-3063, CVE-2017-3064, RHSA-2017:0934-01, SUSE-SU-2017:0990-1, VIGILANCE-VUL-22420, ZDI-17-245, ZDI-17-246, ZDI-17-247, ZDI-17-248, ZDI-17-278, ZDI-17-279.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Full Vigil@nce bulletin... (Free trial)

security bulletin CVE-2017-0290

Microsoft Malware Protection Engine: code execution

Synthesis of the vulnerability

An attacker can send a malicious document or invite the victim to read a malicious document, in order to run code during the analysis by Microsoft Malware Protection Engine.
Severity: 4/4.
Creation date: 09/05/2017.
Revision date: 09/05/2017.
Identifiers: 1252, 4022344, CERTFR-2017-ALE-009, CERTFR-2017-AVI-151, CVE-2017-0290, VIGILANCE-VUL-22655.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Microsoft Malware Protection Engine product analyzes files, searching for malware. It is used in several Microsoft security products (Windows Defender, Microsoft Security Essentials, etc.).

However, when a malicious file is analyzed, code runs with LocalSystem privileges in mpengine.dll.

An attacker can therefore send a malicious document or invite the victim to read a malicious document, in order to run code during the analysis by Microsoft Malware Protection Engine.
Full Vigil@nce bulletin... (Free trial)

computer weakness CVE-2017-0058 CVE-2017-0155 CVE-2017-0156

Windows: vulnerabilities of April 2017

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 28.
Creation date: 12/04/2017.
Revisions dates: 12/04/2017, 14/04/2017, 19/04/2017.
Identifiers: 1078, 1079, 1093, 1192, CERTFR-2017-AVI-109, CVE-2017-0058, CVE-2017-0155, CVE-2017-0156, CVE-2017-0158, CVE-2017-0159, CVE-2017-0162, CVE-2017-0163, CVE-2017-0164, CVE-2017-0165, CVE-2017-0166, CVE-2017-0167, CVE-2017-0168, CVE-2017-0169, CVE-2017-0178, CVE-2017-0179, CVE-2017-0180, CVE-2017-0181, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, CVE-2017-0186, CVE-2017-0188, CVE-2017-0189, CVE-2017-0191, CVE-2017-0192, CVE-2017-0199, CVE-2017-0211, VIGILANCE-VUL-22413, ZDI-17-284, ZDI-17-285.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

weakness announce CVE-2017-0001 CVE-2017-0005 CVE-2017-0007

Windows: vulnerabilities of March 2017

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 82.
Creation date: 14/03/2017.
Revision date: 22/03/2017.
Identifiers: 1019, 1021, 1022, 1023, 1025, 1027, 1028, 1029, 1030, 1031, 1042, 1052, 1053, 1054, 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 993, CERTFR-2017-AVI-082, CERTFR-2017-AVI-154, CVE-2017-0001, CVE-2017-0005, CVE-2017-0007, CVE-2017-0008, CVE-2017-0014, CVE-2017-0016, CVE-2017-0021, CVE-2017-0022, CVE-2017-0023, CVE-2017-0024, CVE-2017-0025, CVE-2017-0026, CVE-2017-0039, CVE-2017-0042, CVE-2017-0043, CVE-2017-0045, CVE-2017-0047, CVE-2017-0050, CVE-2017-0051, CVE-2017-0055, CVE-2017-0056, CVE-2017-0057, CVE-2017-0060, CVE-2017-0061, CVE-2017-0062, CVE-2017-0063, CVE-2017-0072, CVE-2017-0073, CVE-2017-0074, CVE-2017-0075, CVE-2017-0076, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082, CVE-2017-0083, CVE-2017-0084, CVE-2017-0085, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, CVE-2017-0090, CVE-2017-0091, CVE-2017-0092, CVE-2017-0095, CVE-2017-0096, CVE-2017-0097, CVE-2017-0098, CVE-2017-0099, CVE-2017-0100, CVE-2017-0101, CVE-2017-0102, CVE-2017-0103, CVE-2017-0104, CVE-2017-0108, CVE-2017-0109, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, CVE-2017-0128, CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, CVE-2017-0148, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, VIGILANCE-VUL-22132, ZDI-17-168.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2017-2997 CVE-2017-2998 CVE-2017-2999

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 7.
Creation date: 14/03/2017.
Revision date: 22/03/2017.
Identifiers: 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 4014329, APSB17-07, CERTFR-2017-AVI-077, CVE-2017-2997, CVE-2017-2998, CVE-2017-2999, CVE-2017-3000, CVE-2017-3001, CVE-2017-3002, CVE-2017-3003, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, MS17-023, RHSA-2017:0526-01, SUSE-SU-2017:0703-1, VIGILANCE-VUL-22122, ZDI-17-174, ZDI-17-175, ZDI-17-176, ZDI-17-177, ZDI-17-178, ZDI-17-179, ZDI-17-287.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Adobe Flash Player.

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2997]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2998]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2999]

An attacker can predict a random, in order to obtain sensitive information. [severity:2/4; CVE-2017-3000]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-3001, ZDI-17-174, ZDI-17-175, ZDI-17-176, ZDI-17-177, ZDI-17-178, ZDI-17-179]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-3002]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-3003]
Full Vigil@nce bulletin... (Free trial)

cybersecurity weakness CVE-2016-3216 CVE-2016-3219 CVE-2016-3220

Microsoft Windows: three vulnerabilities via Graphics Component

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Graphics Component of Microsoft Windows.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 3.
Creation date: 15/06/2016.
Revisions dates: 21/06/2016, 15/02/2017.
Identifiers: 3164036, 779, 785, 992, CERTFR-2016-AVI-206, CVE-2016-3216, CVE-2016-3219, CVE-2016-3220, MS16-074, VIGILANCE-VUL-19887.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Microsoft Windows.

An attacker can get nformation useful to bypass ASLR. [severity:3/4; CVE-2016-3216]

An attacker can corrupt an object in memory, in order to get kernel privileges. [severity:3/4; 779, CVE-2016-3219]

An attacker can bypass security features via ATMFD.dll, in order to escalate his privileges. [severity:3/4; 785, CVE-2016-3220]
Full Vigil@nce bulletin... (Free trial)

threat announce CVE-2017-0038

Microsoft Windows: information disclosure via gdi32.dll

Synthesis of the vulnerability

A local attacker can trigger a read only buffer overflow via gdi32.dll of Microsoft Windows via a data structure of type EMR_SETDIBITSTODEVICE, in order to get sensitive information.
Severity: 1/4.
Creation date: 15/02/2017.
Identifiers: 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 992, CERTFR-2017-ALE-002, CVE-2017-0038, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, VIGILANCE-VUL-21837.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A local attacker can trigger a read only buffer overflow via gdi32.dll of Microsoft Windows via a data structure of type EMR_SETDIBITSTODEVICE, in order to get sensitive information.

The bulletin VIGILANCE-VUL-19887 indicates a similar vulnerability (CVE-2016-3216), which has been fixed as annouced in MS16-074.
Full Vigil@nce bulletin... (Free trial)

security weakness 21760

Windows: memory corruption via SMB Tree Connect Response

Synthesis of the vulnerability

An attacker can generate a memory corruption via SMB Tree Connect Response on a Windows client, in order to trigger a denial of service, and possibly to run code.
Severity: 3/4.
Creation date: 03/02/2017.
Identifiers: VIGILANCE-VUL-21760, VU#867968.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Windows system can connect to a remote share, using the SMB/CIFS protocol.

When a SMB client connects, it sends a SMB2 TREE_CONNECT Request message to the server. It then returns a SMB2 TREE_CONNECT Response message to the client. However, if this message contains too many data, the client memory is corrupted.

An attacker can therefore generate a memory corruption via SMB Tree Connect Response on a Windows client, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

threat bulletin CVE-2017-0004

Windows: denial of service via LSASS

Synthesis of the vulnerability

An attacker can generate a fatal error via LSASS (Local Security Authority Subsystem Service) of Windows, in order to trigger a denial of service.
Severity: 1/4.
Creation date: 11/01/2017.
Identifiers: 3216771, CERTFR-2017-AVI-010, CVE-2017-0004, MS17-004, VIGILANCE-VUL-21543.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can generate a fatal error via LSASS (Local Security Authority Subsystem Service) of Windows, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2014-0282 CVE-2014-1762 CVE-2014-1764

Internet Explorer: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Internet Explorer.
Severity: 4/4.
Number of vulnerabilities in this bulletin: 4.
Creation date: 10/06/2014.
Revision date: 20/12/2016.
Identifiers: 2969262, CERTFR-2014-AVI-266, CVE-2014-0282, CVE-2014-1762, CVE-2014-1764, CVE-2014-1766, CVE-2014-1769, CVE-2014-1771, CVE-2014-1772, CVE-2014-1773, CVE-2014-1774, CVE-2014-1775, CVE-2014-1777, CVE-2014-1778, CVE-2014-1779, CVE-2014-1780, CVE-2014-1781, CVE-2014-1782, CVE-2014-1783, CVE-2014-1784, CVE-2014-1785, CVE-2014-1786, CVE-2014-1788, CVE-2014-1789, CVE-2014-1790, CVE-2014-1791, CVE-2014-1792, CVE-2014-1794, CVE-2014-1795, CVE-2014-1796, CVE-2014-1797, CVE-2014-1799, CVE-2014-1800, CVE-2014-1802, CVE-2014-1803, CVE-2014-1804, CVE-2014-1805, CVE-2014-2753, CVE-2014-2754, CVE-2014-2755, CVE-2014-2756, CVE-2014-2757, CVE-2014-2758, CVE-2014-2759, CVE-2014-2760, CVE-2014-2761, CVE-2014-2763, CVE-2014-2764, CVE-2014-2765, CVE-2014-2766, CVE-2014-2767, CVE-2014-2768, CVE-2014-2769, CVE-2014-2770, CVE-2014-2771, CVE-2014-2772, CVE-2014-2773, CVE-2014-2775, CVE-2014-2776, CVE-2014-2777, CVE-2014-2782, MS14-035, VIGILANCE-VUL-14876, ZDI-14-174, ZDI-14-175, ZDI-14-176, ZDI-14-177, ZDI-14-178, ZDI-14-179, ZDI-14-180, ZDI-14-181, ZDI-14-182, ZDI-14-183, ZDI-14-184, ZDI-14-185, ZDI-14-186, ZDI-14-212, ZDI-14-213, ZDI-14-226, ZDI-14-227, ZDI-14-237, ZDI-14-259, ZDI-14-260, ZDI-14-270, ZDI-14-354, ZDI-14-357, ZDI-14-366, ZDI-14-367.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Internet Explorer.

An attacker can use a TLS Certificate Renegotiation, in order to obtain sensitive information. [severity:2/4; CVE-2014-1771]

An attacker can read local files, in order to obtain sensitive information. [severity:2/4; CVE-2014-1777]

An attacker can use three vulnerabilities, in order to escalate his privileges. [severity:2/4; CVE-2014-1764, CVE-2014-1778, CVE-2014-2777]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2014-0282, CVE-2014-1762, CVE-2014-1766, CVE-2014-1769, CVE-2014-1772, CVE-2014-1773, CVE-2014-1774, CVE-2014-1775, CVE-2014-1779, CVE-2014-1780, CVE-2014-1781, CVE-2014-1782, CVE-2014-1783, CVE-2014-1784, CVE-2014-1785, CVE-2014-1786, CVE-2014-1788, CVE-2014-1789, CVE-2014-1790, CVE-2014-1791, CVE-2014-1792, CVE-2014-1794, CVE-2014-1795, CVE-2014-1796, CVE-2014-1797, CVE-2014-1799, CVE-2014-1800, CVE-2014-1802, CVE-2014-1803, CVE-2014-1804, CVE-2014-1805, CVE-2014-2753, CVE-2014-2754, CVE-2014-2755, CVE-2014-2756, CVE-2014-2757, CVE-2014-2758, CVE-2014-2759, CVE-2014-2760, CVE-2014-2761, CVE-2014-2763, CVE-2014-2764, CVE-2014-2765, CVE-2014-2766, CVE-2014-2767, CVE-2014-2768, CVE-2014-2769, CVE-2014-2770, CVE-2014-2771, CVE-2014-2772, CVE-2014-2773, CVE-2014-2775, CVE-2014-2776, CVE-2014-2782, ZDI-14-174, ZDI-14-175, ZDI-14-176, ZDI-14-177, ZDI-14-178, ZDI-14-179, ZDI-14-180, ZDI-14-181, ZDI-14-182, ZDI-14-183, ZDI-14-184, ZDI-14-185, ZDI-14-186, ZDI-14-212, ZDI-14-213, ZDI-14-226, ZDI-14-227, ZDI-14-237, ZDI-14-259, ZDI-14-260, ZDI-14-270, ZDI-14-354, ZDI-14-357, ZDI-14-366, ZDI-14-367]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.