Orange Applications for Business
Vigil@nce Vigil@nce Vigil@nce
analyzing computer vulnerabilities since 1999
  home presentation vulnerabilities documentation contact  
subscriber area subscriber area
free trial free trial
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.
recent vulnerabilities recent vulnerabilities
tracked products tracked products
RSS feed RSS feed
vulnerable product
Vulnerabilities of SLES

SLES vulnerability: privilege escalation via SVG Navigation
An attacker can use the SVG Navigation feature of Firefox or SeaMonkey, in order to escalate his privileges.

SLES vulnerability: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player.

SLES vulnerability: NULL pointer dereference via X509_to_X509_REQ
An attacker can force a NULL pointer to be dereferenced in X509_to_X509_REQ() of OpenSSL, in order to trigger a denial of service.

SLES vulnerability: information disclosure via handle_xyz_io
A local attacker can read a memory fragment via the handle_xyz_io functions of Xen, in order to obtain sensitive information.

SLES vulnerability: buffer overflow of splice
An attacker can generate a buffer overflow in splice() of the Linux kernel, in order to trigger a denial of service, and possibly to execute code.

Display other vulnerabilities of SLES described by Vigil@nce...

Display information about SLES:



















Copyright 1999-2015 Vigil@nce. Vigil@nce is a service from Orange Applications for Business. Site map. Legal notice. version française