The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Power-1 Appliance multiple vulnerabilities
An attacker can use several vulnerabilities of
c04554677, c04574882, c04916783, CERTFR-2014-AVI-537, CERTFR-2014-AVI-538, CERTFR-2016-AVI-148, cisco-sa-20141222-ntpd, cpuoct2016, CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296, DSA-3108-1, FEDORA-2014-17361, FEDORA-2014-17367, FEDORA-2014-17395, FreeBSD-SA-14:31.ntp, HPSBHF03432, HPSBPV03266, HPSBUX03240, JSA10663, MBGSA-1405, MDVSA-2015:003, MDVSA-2015:140, NetBSD-SA2015-003, openSUSE-SU-2014:1670-1, openSUSE-SU-2014:1680-1, RHSA-2014:2024-01, RHSA-2014:2025-01, RHSA-2015:0104-01, sk103825, SOL15933, SOL15934, SOL15935, SOL15936, SSA:2014-356-01, SSA-671683, SSRT101872, SUSE-SU-2014:1686-1, SUSE-SU-2014:1686-2, SUSE-SU-2014:1686-3, SUSE-SU-2014:1690-1, SUSE-SU-2015:0259-1, SUSE-SU-2015:0259-2, SUSE-SU-2015:0259-3, SUSE-SU-2015:0274-1, SUSE-SU-2015:0322-1, USN-2449-1, VIGILANCE-VUL-15867, VN-2014-005, VU#852879
Check Point, Cisco, IBM, F5, FortiOS: information disclosure via POODLE on TLS
An attacker, located as a Man-in-the-Middle, can decrypt a Terminating TLS session, in order to obtain sensitive information...
1450666, 1610582, 1647054, 1692906, 1693052, 1693142, bulletinjul2017, CERTFR-2014-AVI-533, CSCus08101, CSCus09311, CVE-2014-8730, CVE-2015-2774, FEDORA-2015-12923, FEDORA-2015-12970, openSUSE-SU-2016:0523-1, sk103683, SOL15882, USN-3571-1, VIGILANCE-VUL-15756
Check Point: vulnerabilities of IPMI
An attacker can use IPMI vulnerabilities in several Check Point products, in order to perform management operations on the hardware...
sk94228, VIGILANCE-VUL-13270
Check Point R75.40VS: information disclosure via SecureXL
An attacker can capture SIP/MGCP packets when SecureXL is enabled on Check Point R75.40VS, in order to obtain sensitive information...
sk92814, VIGILANCE-VUL-13191
CheckPoint Security Gateway: information disclosure via VoIP
When SecureXL is enabled on caller side, an attacker can capture VoIP communications of CheckPoint Security Gateway, in order to obtain sensitive information...
sk92814, VIGILANCE-VUL-12981
Check Point VSX Virtual System: no policy
When Check Point VSX Virtual System R75.40VS/R76 (VSX mode) is restarted, the security policy may be not applied...
sk92812, VIGILANCE-VUL-12884
TCP: packets injection via a firewall and a malware
When an attacker installed an unprivileged malware on a client computer, and when a firewall is located between this client and a TCP server, an attacker who is located on the internet can guess valid sequence numbers, in order to inject data in this TCP session...
FGA-2012-19, sk74640, VIGILANCE-VUL-11656
OpenSSH: information disclosure via CBC
An attacker capturing an OpenSSH session has a low probability to obtain 32 bits of plain text...
247186, 6761890, BID-32319, CPNI-957037, CVE-2008-5161, DSA-2019-197, NetBSD-SA2009-005, RHSA-2009:1287-02, sk36343, sol14609, VIGILANCE-VUL-8251, VU#958563
Our database contains other pages. You can request a free trial to read them.