we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of SLES
SLES vulnerability: accepting X.509 CA v1
An attacker can ask a trusted certification authority to create an X.509 v1 certificate, which is accepted by GnuTLS as being a root certificate.
SLES vulnerability: several vulnerabilities of January 2014
Several vulnerabilities of Oracle Database were announced in January 2014.
SLES vulnerability: revocation of IGC/A AC DG Trésor SSL
The IGC/A (AC DGTPE Signature Authentification) intermediary certification authority (AC DG Trésor SSL) emitted certificates to spoof several Google domains.
SLES vulnerability: buffer overflow of Floating Point
An attacker can generate a buffer overflow during the conversion of real number by Ruby, in order to trigger a denial of service, and possibly to execute code.
SLES vulnerability: access to Data Streams
When Samba is configured to support Data Streams, an attacker can bypass the ACL of associated files, in order to read or alter their Data Streams.
Display other vulnerabilities of SLES described by Vigil@nce...
Display information about SLES:
. Vigil@nce is a service from
Orange Business Services