The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of MicroFocus Network Node Manager i

Java JRE/JDK/SDK: several vulnerabilities
Several vulnerabilities of Java JRE/JDK/SDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code...
BID-43965, BID-43971, BID-43979, BID-43985, BID-43988, BID-43992, BID-43994, BID-43999, BID-44009, BID-44011, BID-44012, BID-44013, BID-44014, BID-44016, BID-44017, BID-44020, BID-44021, BID-44023, BID-44024, BID-44026, BID-44027, BID-44028, BID-44030, BID-44032, BID-44035, BID-44038, BID-44040, c02616748, c03405642, CERTA-2009-AVI-528, CERTA-2010-AVI-149, CERTA-2010-AVI-196, CERTA-2010-AVI-219, CERTA-2010-AVI-239, CERTA-2010-AVI-241, CERTA-2010-AVI-365, CERTA-2010-AVI-500, CERTA-2010-AVI-513, CERTA-2010-AVI-573, CERTA-2011-AVI-253, CERTA-2011-AVI-400, CERTA-2012-AVI-241, CERTA-2012-AVI-395, CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3552, CVE-2010-3553, CVE-2010-3554, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3559, CVE-2010-3560, CVE-2010-3561, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3567, CVE-2010-3568, CVE-2010-3569, CVE-2010-3570, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, FEDORA-2010-16240, FEDORA-2010-16294, FEDORA-2010-16312, HPSBMU02799, HPSBUX02608, openSUSE-SU-2010:0754-1, openSUSE-SU-2010:0957-1, RHSA-2010:0768-01, RHSA-2010:0770-01, RHSA-2010:0786-01, RHSA-2010:0807-01, RHSA-2010:0865-02, RHSA-2010:0873-02, RHSA-2010:0935-01, RHSA-2010:0986-01, RHSA-2010:0987-01, RHSA-2011:0152-01, RHSA-2011:0169-01, RHSA-2011:0880-01, SSRT100333, SSRT100867, SUSE-SA:2010:061, SUSE-SA:2011:006, SUSE-SA:2011:014, SUSE-SR:2010:019, VIGILANCE-VUL-10040, VMSA-2011-0003, VMSA-2011-0003.1, VMSA-2011-0003.2, VMSA-2011-0004.2, VMSA-2011-0005.3, VMSA-2011-0012.1, VMSA-2011-0013, VMSA-2012-0005, ZDI-10-202, ZDI-10-203, ZDI-10-204, ZDI-10-205, ZDI-10-206, ZDI-10-207, ZDI-10-208
PostgreSQL: privilege elevation via PL
A local attacker can redefine a function of a procedural language, and use a role changing mechanism, in order to elevate his privileges on PostgreSQL...
BID-43747, c03333585, CERTA-2002-AVI-272, CERTA-2010-AVI-471, CVE-2010-3433, DSA-2120-1, FEDORA-2010-15852, FEDORA-2010-15954, FEDORA-2010-15960, HPSBMU02781, MDVSA-2010:197, openSUSE-SU-2010:0903-1, PSN-2012-08-686, PSN-2012-08-687, PSN-2012-08-688, PSN-2012-08-689, PSN-2012-08-690, RHSA-2010:0742-01, RHSA-2010:0908-01, SSRT100617, SUSE-SR:2010:019, SUSE-SR:2010:020, VIGILANCE-VUL-10005
PostgreSQL: five vulnerabilities
An attacker can use five vulnerabilities of PostgreSQL, in order to execute code or to generate a denial of service...
BID-40215, BID-40304, BID-40305, c03333585, CERTA-2010-AVI-214, CVE-2010-1169, CVE-2010-1170, CVE-2010-1447, CVE-2010-1975, DSA-2051-1, FEDORA-2010-15870, FEDORA-2010-16004, FEDORA-2010-8696, FEDORA-2010-8715, FEDORA-2010-8723, HPSBMU02781, MDVSA-2010:103, PSN-2012-08-686, PSN-2012-08-687, PSN-2012-08-688, PSN-2012-08-689, PSN-2012-08-690, RHSA-2010:0427-01, RHSA-2010:0428-01, RHSA-2010:0429-01, RHSA-2010:0430-01, SSRT100617, SUSE-SR:2010:014, SUSE-SR:2010:016, VIGILANCE-VUL-9647
JBoss Enterprise Application Platform: three vulnerabilities
An attacker can use three vulnerabilities of JBoss Enterprise Application Platform, in order to access to the console or to obtain sensitive information...
BID-39710, c03057508, c03127140, c03824583, CA20130213-01, CERTA-2013-AVI-440, CVE-2010-0738, CVE-2010-1428, CVE-2010-1429, HPSBMU02714, HPSBMU02736, HPSBMU02894, RHSA-2010:0376-01, RHSA-2010:0377-01, RHSA-2010:0378-01, RHSA-2010:0379-01, SSRT100244, SSRT100699, VIGILANCE-VUL-9613
Java JRE/JDK/SDK: several vulnerabilities
Several vulnerabilities of Java JRE/JDK/SDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code...
BID-39062, BID-39065, BID-39067, BID-39068, BID-39069, BID-39070, BID-39071, BID-39072, BID-39073, BID-39075, BID-39077, BID-39078, BID-39081, BID-39082, BID-39083, BID-39084, BID-39085, BID-39086, BID-39088, BID-39089, BID-39090, BID-39091, BID-39093, BID-39094, BID-39095, BID-39096, BID-39559, c02122104, c03405642, CERTA-2009-AVI-528, CERTA-2010-AVI-149, CERTA-2010-AVI-192, CERTA-2010-AVI-196, CERTA-2010-AVI-239, CERTA-2010-AVI-241, CERTA-2010-AVI-276, CERTA-2010-AVI-365, CERTA-2010-AVI-513, CERTA-2010-AVI-573, CERTA-2011-AVI-253, CERTA-2012-AVI-241, CERTA-2012-AVI-395, CVE-2009-3555, CVE-2009-3910, CVE-2010-0082, CVE-2010-0084, CVE-2010-0085, CVE-2010-0087, CVE-2010-0088, CVE-2010-0089, CVE-2010-0090, CVE-2010-0091, CVE-2010-0092, CVE-2010-0093, CVE-2010-0094, CVE-2010-0095, CVE-2010-0837, CVE-2010-0838, CVE-2010-0839, CVE-2010-0840, CVE-2010-0841, CVE-2010-0842, CVE-2010-0843, CVE-2010-0844, CVE-2010-0845, CVE-2010-0846, CVE-2010-0847, CVE-2010-0848, CVE-2010-0849, CVE-2010-0850, FEDORA-2010-6025, FEDORA-2010-6039, FEDORA-2010-6279, HPSBMU02799, HPSBUX02524, javacpumar2010, MDVSA-2010:084, RHSA-2010:0337-01, RHSA-2010:0338-01, RHSA-2010:0339-01, RHSA-2010:0383-01, RHSA-2010:0408-01, RHSA-2010:0471-01, RHSA-2010:0489-01, RHSA-2010:0574-01, RHSA-2010:0586-01, RHSA-2010:0865-02, SSRT100089, SSRT100867, SUSE-SA:2010:026, SUSE-SA:2010:028, SUSE-SR:2010:008, SUSE-SR:2010:011, SUSE-SR:2010:013, SUSE-SR:2010:017, VIGILANCE-VUL-9550, VMSA-2011-0003, VMSA-2011-0003.1, VMSA-2011-0003.2, VU#507652, ZDI-10-051, ZDI-10-052, ZDI-10-053, ZDI-10-054, ZDI-10-055, ZDI-10-056, ZDI-10-057, ZDI-10-059, ZDI-10-060, ZDI-10-061
HP NNM: code execution
A remote attacker can execute a command on the server using a vulnerability of HP Network Node Manager...
BID-38174, c01954593, CERTA-2010-AVI-075, CVE-2010-0445, HPSBMA02484, SSRT090076, VIGILANCE-VUL-9440
PostgreSQL: two vulnerabilities
An attacker can use two vulnerabilities of PostgreSQL, in order to access to user's data...
274870, 6909139, 6909140, 6909142, BID-37333, BID-37334, c03333585, CERTA-2009-AVI-546, CVE-2009-4034, CVE-2009-4136, DSA-1964-1, FEDORA-2009-13363, FEDORA-2009-13381, HPSBMU02781, MDVSA-2009:333, RHSA-2010:0427-01, RHSA-2010:0428-01, RHSA-2010:0429-01, SSRT100617, SUSE-SR:2010:001, TLSA-2010-2, VIGILANCE-VUL-9285
Jboss EAP: several vulnerabilities
Several vulnerabilities affect JBoss EAP...
539495, BID-35671, BID-35958, BID-37276, c03824583, CERTA-2009-AVI-279, CERTA-2009-AVI-312, CERTA-2009-AVI-452, CERTA-2010-AVI-253, CERTA-2013-AVI-440, CVE-2009-0217, CVE-2009-1380, CVE-2009-2405, CVE-2009-2625, CVE-2009-3554, HPSBMU02894, RHSA-2009:1636-01, RHSA-2009:1637-01, RHSA-2009:1649-01, RHSA-2009:1650-01, SUSE-SR:2010:015, VIGILANCE-VUL-9267, VU#466161
Java JRE/JDK/SDK: several vulnerabilities
Several vulnerabilities of Java JRE/JDK/SDK can be used by a malicious applet/application in order to execute code or to obtain information. A legitimate applet/application, handling malicious data, can also be forced to execute code...
269868, 269869, 269870, 270474, 270475, 270476, 6631533, 6636650, 6657026, 6657138, 6664512, 6815780, 6822057, 6824265, 6854303, 6862968, 6862969, 6862970, 6863503, 6864911, 6869694, 6869752, 6870531, 6872357, 6872358, 6872824, 6874643, BID-36881, c01997760, c03005726, c03405642, CERTA-2011-AVI-523, CERTA-2011-AVI-651, CERTA-2012-AVI-395, CVE-2009-3728, CVE-2009-3729, CVE-2009-3864, CVE-2009-3865, CVE-2009-3866, CVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872, CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882, CVE-2009-3883, CVE-2009-3884, CVE-2009-3886, FEDORA-2009-11486, FEDORA-2009-11490, HPSBMU02703, HPSBMU02799, HPSBUX02503, MDVSA-2010:084, RHSA-2009:1560-01, RHSA-2009:1571-01, RHSA-2009:1584-01, RHSA-2009:1643-01, RHSA-2009:1647-01, RHSA-2009:1662-01, RHSA-2009:1694-01, RHSA-2010:0043-01, RHSA-2010:0408-01, SSRT100019, SSRT100242, SSRT100867, SUSE-SA:2009:058, SUSE-SA:2010:002, SUSE-SA:2010:003, SUSE-SA:2010:004, VIGILANCE-VUL-9156, VMSA-2010-0002, VMSA-2010-0002.1, VMSA-2010-0002.2, VMSA-2010-0002.3, ZDI-09-076, ZDI-09-077, ZDI-09-078, ZDI-09-079, ZDI-09-080
PostgreSQL: three vulnerabilities
Three vulnerabilities of PostgreSQL can be used by an attacker to create a denial of service, to elevate his privileges, or to access to the service...
270408, 6784052, 6879165, 6879166, 6888545, BID-36314, c03333585, CERTA-2009-AVI-380, CVE-2009-3229, CVE-2009-3230, CVE-2009-3231, DSA-1900-1, FEDORA-2009-9473, FEDORA-2009-9474, HPSBMU02781, http://sunsolve.sun.com/search/document.do?assetkey=1-66-270408-16879165, MDVSA-2009:176, MDVSA-2009:177, MDVSA-2009:251-1, RHSA-2009:1461-01, RHSA-2009:1484-01, RHSA-2009:1485-01, SSRT100617, SUSE-SR:2009:016, SUSE-SR:2009:017, TLSA-2009-29, VIGILANCE-VUL-9015
Our database contains other pages. You can request a free trial to read them.

Display information about MicroFocus Network Node Manager i: