Vulnerabilities of SLESSLES vulnerability: code execution via Function Variable
An attacker can define a special environment variable, which is transmitted (via CGI or OpenSSH for example) to bash, in order to execute code.SLES vulnerability: multiple vulnerabilities
An attacker can use several vulnerabilities of Wireshark.SLES vulnerability: use after free via SPL ArrayIterator
A local attacker can use a freed memory area in SPL ArrayIterator of PHP, in order to trigger a denial of service, and possibly to execute code.SLES vulnerability: denial of service via iconv and IBM93x
An attacker can provide special IBM933, IBM935, IBM937, IBM939 or IBM1364 data to an application linked to the glibc and using iconv(), in order to trigger a denial of service.SLES vulnerability: buffer overflow of __gconv_translit_find
An attacker can generate a buffer overflow in the __gconv_translit_find() function of the glibc, in order to trigger a denial of service, and possibly to execute code.Display other vulnerabilities of SLES described by Vigil@nce...
Display information about SLES: