The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Windows 8

Windows: privilege escalation via win32k-MNGetpItemFromIndex NtUserMNDragOver
An attacker can bypass restrictions via win32k::MNGetpItemFromIndex NtUserMNDragOver() of Windows, in order to escalate his privileges...
CVE-2019-0808, VIGILANCE-VUL-28702
Adobe Flash Player: out-of-bounds memory reading
An attacker can force a read at an invalid address of Adobe Flash Player, in order to trigger a denial of service, or to obtain sensitive information...
APSB19-06, CERTFR-2019-AVI-057, CVE-2019-7090, RHSA-2019:0348-01, VIGILANCE-VUL-28482
Microsoft Windows: vulnerabilities of January 2019
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2019-AVI-009, CVE-2019-0536, CVE-2019-0538, CVE-2019-0543, CVE-2019-0547, CVE-2019-0549, CVE-2019-0550, CVE-2019-0551, CVE-2019-0552, CVE-2019-0553, CVE-2019-0554, CVE-2019-0555, CVE-2019-0569, CVE-2019-0570, CVE-2019-0571, CVE-2019-0572, CVE-2019-0573, CVE-2019-0574, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584, VIGILANCE-VUL-28190, ZDI-19-006, ZDI-19-007, ZDI-19-008, ZDI-19-009, ZDI-19-010, ZDI-19-011, ZDI-19-012, ZDI-19-220, ZDI-19-221
Windows: privilege escalation via MsiAdvertiseProduct
An attacker can bypass restrictions via MsiAdvertiseProduct of Windows, in order to escalate his privileges...
VIGILANCE-VUL-28108, VU#228297
Microsoft IE: memory corruption via JScript
An attacker can generate a memory corruption via JScript of Microsoft IE, in order to trigger a denial of service, and possibly to run code...
CERTFR-2018-AVI-606, CVE-2018-8653, VIGILANCE-VUL-28070, VU#573168
Microsoft Windows: vulnerabilities of December 2018
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2018-AVI-596, CVE-2018-8477, CVE-2018-8514, CVE-2018-8595, CVE-2018-8596, CVE-2018-8599, CVE-2018-8611, CVE-2018-8612, CVE-2018-8621, CVE-2018-8622, CVE-2018-8626, CVE-2018-8634, CVE-2018-8637, CVE-2018-8638, CVE-2018-8639, CVE-2018-8641, CVE-2018-8649, FG-VD-18-152, VIGILANCE-VUL-28007, VU#289907, VU#531281, ZDI-18-1404
Microsoft IE/Edge: vulnerabilities of December 2018
An attacker can use several vulnerabilities of Microsoft products...
1668, 1669, 1684, CERTFR-2018-AVI-593, CERTFR-2018-AVI-594, CVE-2018-8583, CVE-2018-8617, CVE-2018-8618, CVE-2018-8619, CVE-2018-8624, CVE-2018-8625, CVE-2018-8629, CVE-2018-8631, CVE-2018-8643, VIGILANCE-VUL-28004, ZDI-18-1407, ZDI-18-1408
Adobe Flash Player: two vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
APSB18-42, CERTFR-2018-AVI-587, CVE-2018-15982, CVE-2018-15983, RHSA-2018:3795-01, VIGILANCE-VUL-27954
Adobe Flash Player: memory corruption via Type Confusion
An attacker can generate a memory corruption via Type Confusion of Adobe Flash Player, in order to trigger a denial of service, and possibly to run code...
ADV180030, APSB18-44, CERTFR-2018-AVI-563, CVE-2018-15981, RHSA-2018:3644-01, VIGILANCE-VUL-27832
Microsoft Windows: vulnerabilities of November 2018
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2018-AVI-552, CVE-2018-8256, CVE-2018-8407, CVE-2018-8408, CVE-2018-8415, CVE-2018-8417, CVE-2018-8450, CVE-2018-8454, CVE-2018-8471, CVE-2018-8476, CVE-2018-8485, CVE-2018-8544, CVE-2018-8547, CVE-2018-8549, CVE-2018-8550, CVE-2018-8553, CVE-2018-8554, CVE-2018-8561, CVE-2018-8562, CVE-2018-8563, CVE-2018-8565, CVE-2018-8566, CVE-2018-8584, CVE-2018-8589, CVE-2018-8592, VIGILANCE-VUL-27775, ZDI-18-1349, ZDI-18-1357
Our database contains other pages. You can request a free trial to read them.

Display information about Windows 8: