The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Dell EMC Unisphere

Oracle Java, OpenJDK: vulnerabilities of October 2020
Several vulnerabilities were announced in Oracle products...
6379260, CERTFR-2020-AVI-663, cpuoct2020, CVE-2020-14779, CVE-2020-14781, CVE-2020-14782, CVE-2020-14792, CVE-2020-14796, CVE-2020-14797, CVE-2020-14798, CVE-2020-14803, DLA-2412-1, DLA-2412-2, DSA-2020-278, DSA-2021-001, DSA-4779-1, FEDORA-2020-421f817e5f, FEDORA-2020-81e511d0d8, FEDORA-2020-84137f197e, FEDORA-2020-a405eea76a, FEDORA-2020-d1b8d3f94a, FEDORA-2020-fdc79d8e5b, FEDORA-2020-febe36c3ac, openSUSE-SU-2020:1893-1, openSUSE-SU-2020:1984-1, openSUSE-SU-2020:1994-1, openSUSE-SU-2020:2048-1, openSUSE-SU-2020:2083-1, openSUSE-SU-2020:2170-1, RHSA-2020:4305-01, RHSA-2020:4306-01, RHSA-2020:4307-01, RHSA-2020:4316-01, RHSA-2020:4347-01, RHSA-2020:4348-01, RHSA-2020:4349-01, RHSA-2020:4350-01, RHSA-2020:4352-01, RHSA-2020:5585-01, RHSA-2020:5586-01, SUSE-SU-2020:14587-1, SUSE-SU-2020:14588-1, SUSE-SU-2020:3159-1, SUSE-SU-2020:3191-1, SUSE-SU-2020:3310-1, SUSE-SU-2020:3359-1, SUSE-SU-2020:3460-1, SUSE-SU-2020:3591-1, SUSE-SU-2020:3932-1, SUSE-SU-2021:0019-1, SUSE-SU-2021:0032-1, USN-4607-1, VIGILANCE-VUL-33649
Microsoft .NET Framework: information disclosure
An attacker can bypass access restrictions to data of Microsoft .NET Framework, in order to obtain sensitive information...
CERTFR-2020-AVI-635, CVE-2020-16937, DSA-2020-278, VIGILANCE-VUL-33557
Ansible Tower: Cross Site Request Forgery via Webhooks
An attacker can trigger a Cross Site Request Forgery via Webhooks of Ansible Tower, in order to force the victim to perform operations...
CVE-2020-1432, DSA-2020-278, VIGILANCE-VUL-33010
Dell EMC Unisphere for PowerMax: privilege escalation via Database Statistics
An attacker can bypass restrictions via Database Statistics of Dell EMC Unisphere for PowerMax, in order to escalate his privileges...
CVE-2020-5345, DSA-2020-065, VIGILANCE-VUL-32580
Dell EMC Unisphere for PowerMax: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Dell EMC Unisphere for PowerMax, in order to read or write data in the session...
CVE-2020-5367, DSA-2020-065, VIGILANCE-VUL-32579
Windows: vulnerabilities of March 2019
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2019-AVI-104, CVE-2019-0603, CVE-2019-0614, CVE-2019-0617, CVE-2019-0682, CVE-2019-0683, CVE-2019-0689, CVE-2019-0690, CVE-2019-0692, CVE-2019-0693, CVE-2019-0694, CVE-2019-0695, CVE-2019-0696, CVE-2019-0697, CVE-2019-0698, CVE-2019-0701, CVE-2019-0702, CVE-2019-0703, CVE-2019-0704, CVE-2019-0726, CVE-2019-0754, CVE-2019-0755, CVE-2019-0756, CVE-2019-0759, CVE-2019-0765, CVE-2019-0766, CVE-2019-0767, CVE-2019-0772, CVE-2019-0774, CVE-2019-0775, CVE-2019-0776, CVE-2019-0782, CVE-2019-0784, CVE-2019-0797, CVE-2019-0808, CVE-2019-0821, DSA-2019-186, VIGILANCE-VUL-28731, ZDI-19-272, ZDI-19-273, ZDI-19-276, ZDI-19-278, ZDI-19-279, ZDI-19-286
Oracle Java, OpenJDK: vulnerabilities of April 2020
Several vulnerabilities were announced in Oracle products...
6206850, 6235886, 6247119, 6247141, 6250529, 6369095, 6370579, 6371646, 6382282, CERTFR-2020-AVI-217, cpuapr2020, CVE-2020-2754, CVE-2020-2755, CVE-2020-2756, CVE-2020-2757, CVE-2020-2764, CVE-2020-2767, CVE-2020-2773, CVE-2020-2778, CVE-2020-2781, CVE-2020-2800, CVE-2020-2803, CVE-2020-2805, CVE-2020-2816, CVE-2020-2830, DLA-2193-1, DSA-2020-130, DSA-2020-135, DSA-2020-151, DSA-2020-160, DSA-2020-198, DSA-4662-1, DSA-4668-1, FEDORA-2020-07aa58121a, FEDORA-2020-21ca991b3b, FEDORA-2020-36298e20f7, FEDORA-2020-372eeb28f3, FEDORA-2020-4578c4a082, FEDORA-2020-5386fe3bbb, FEDORA-2020-73341c894c, FEDORA-2020-755e4213b5, FEDORA-2020-831ec85119, FEDORA-2020-92ed6d99e4, FEDORA-2020-a60ad9d4ec, JSA11110, KB0085480, NTAP-20200416-0004, openSUSE-SU-2020:0757-1, openSUSE-SU-2020:0800-1, openSUSE-SU-2020:0841-1, RHSA-2020:1506-01, RHSA-2020:1507-01, RHSA-2020:1508-01, RHSA-2020:1509-01, RHSA-2020:1512-01, RHSA-2020:1514-01, RHSA-2020:1515-01, RHSA-2020:1516-01, RHSA-2020:1517-01, RHSA-2020:2236-01, RHSA-2020:2237-01, RHSA-2020:2238-01, RHSA-2020:2239-01, RHSA-2020:2241-01, SB10332, SUSE-SU-2020:14398-1, SUSE-SU-2020:1511-2, SUSE-SU-2020:1571-1, SUSE-SU-2020:1683-1, SUSE-SU-2020:1684-1, SUSE-SU-2020:1685-1, SUSE-SU-2020:1686-1, USN-4337-1, VIGILANCE-VUL-32028
Oracle Java: vulnerabilities of January 2020
Several vulnerabilities were announced in Oracle products...
1289194, 3260187, 5694963, 6120873, 6121041, 6199287, 6199289, 6201679, 6210521, 6210522, 6217590, 6235912, 6245356, 6248703, 6248705, 6250533, 6256052, 6257207, 6338657, 6338659, 6356017, 6356021, 6356023, 6356025, 6359169, 6369095, 6369245, 6382282, CERTFR-2020-AVI-035, CERTFR-2020-AVI-176, cpujan2020, CVE-2020-2583, CVE-2020-2585, CVE-2020-2590, CVE-2020-2593, CVE-2020-2601, CVE-2020-2604, CVE-2020-2654, CVE-2020-2655, CVE-2020-2659, DLA-2128-1, DSA-2020-062, DSA-2020-135, DSA-2020-198, DSA-4605-1, DSA-4621-1, FEDORA-2020-0a2dd63bf0, FEDORA-2020-202cb87e26, FEDORA-2020-2ed6716c30, FEDORA-2020-7e042e371a, FEDORA-2020-d735a887d1, FEDORA-2020-ebbf986d01, JSA11110, openSUSE-SU-2020:0113-1, openSUSE-SU-2020:0147-1, RHSA-2020:0122-01, RHSA-2020:0128-01, RHSA-2020:0157-01, RHSA-2020:0196-01, RHSA-2020:0202-01, RHSA-2020:0231-01, RHSA-2020:0232-01, RHSA-2020:0465-01, RHSA-2020:0467-01, RHSA-2020:0468-01, RHSA-2020:0469-01, RHSA-2020:0470-01, RHSA-2020:0541-01, RHSA-2020:0632-01, RHSA-2020:2236-01, RHSA-2020:2237-01, RHSA-2020:2238-01, RHSA-2020:2239-01, RHSA-2020:2241-01, RHSA-2020:3386-01, RHSA-2020:3387-01, RHSA-2020:3388-01, RHSA-2020:5585-01, SB10315, SUSE-SU-2020:0140-1, SUSE-SU-2020:0213-1, SUSE-SU-2020:0261-1, SUSE-SU-2020:0456-1, SUSE-SU-2020:0466-1, SUSE-SU-2020:0528-1, SUSE-SU-2020:0628-1, SUSE-SU-2020:14286-1, SUSE-SU-2020:14287-1, SUSE-SU-2020:14398-1, SUSE-SU-2020:1683-1, SUSE-SU-2020:1684-1, SUSE-SU-2020:1685-1, USN-4257-1, VIGILANCE-VUL-31331
Dell EMC Unisphere for PowerMax: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Dell EMC Unisphere for PowerMax, in order to run JavaScript code in the context of the web site...
CVE-2019-18588, DSA-2019-193, VIGILANCE-VUL-31196
Internet Explorer: code execution
An attacker can use a vulnerability of Internet Explorer, in order to run code...
CERTFR-2019-AVI-624, CVE-2019-1485, DSA-2020-062, VIGILANCE-VUL-31110
Our database contains other pages. You can request a free trial to read them.