Vulnerabilities of SLESSLES vulnerability: integer overflow of PRI
An attacker can generate an integer overflow via PRI in RSYSLOG, in order to trigger a denial of service, and possibly to execute code.SLES vulnerability: bypassing the certification chain via ASN.1
An attacker can create a malicious X.509 certificate, which is accepted as valid, in order to deceive services using the RSA signature (such as SSL/TLS sessions).SLES vulnerability: multiple vulnerabilities
An attacker can use several vulnerabilities of D-Bus.SLES vulnerability: use after free via SPL ArrayIterator
A local attacker can use a freed memory area in SPL ArrayIterator of PHP, in order to trigger a denial of service, and possibly to execute code.SLES vulnerability: denial of service via iconv and IBM93x
An attacker can provide special IBM933, IBM935, IBM937, IBM939 or IBM1364 data to an application linked to the glibc and using iconv(), in order to trigger a denial of service.Display other vulnerabilities of SLES described by Vigil@nce...
Display information about SLES: