we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of RHEL
RHEL vulnerability: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to execute code on victim's computer.
RHEL vulnerability: privilege escalation via PERF_EVENTS
A local attacker can use the perf_event_open() system call with an invalid event, in order to escalate his privileges.
RHEL vulnerability: several vulnerabilities of April 2013
Several vulnerabilities of MySQL are fixed by the CPU of April 2013.
RHEL vulnerability: multiple vulnerabilities
Several vulnerabilities of Adobe Flash Player can be used by an attacker to execute code.
RHEL vulnerability: buffer overflow of getaddrinfo
An attacker can generate a buffer overflow in the getaddrinfo() function of glibc, in order to trigger a denial of service, and possibly to execute code.
Display other vulnerabilities of RHEL described by Vigil@nce...
Display information about RHEL:
. Vigil@nce is a service from
Orange Business Services