we track for your security since 1999
The Vigil@nce team watches vulnerabilities impacting your computers, and then offers solutions, a database and tools to correct them.
Vulnerabilities of SLES
SLES vulnerability: multiple vulnerabilities
Several vulnerabilities of Adobe Flash Player can be used by an attacker to execute code.
SLES vulnerability: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to execute code on victim's computer.
SLES vulnerability: multiples memory fragment reading via rtnl
A local attacker can use several vulnerabilities of the Linux kernel, in order to obtain memory fragments.
SLES vulnerability: bypassing ASLR via sa_restorer
A command which is launched by an exec() function can obtain the memory structure of its parent process, to bypass ASLR, in order to facilitate the development of an attack tool.
SLES vulnerability: denial of service via install_user_keyrings
A local attacker can use the keyctl() function, in order to dereference a NULL pointer, which stops the kernel.
Display other vulnerabilities of SLES described by Vigil@nce...
Display information about SLES:
. Vigil@nce is a service from
Orange Business Services