The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Micro Focus LoadRunner

Windows domain: privilege escalation via Kerberos KDC
An attacker, who is authenticated on the domain, can create a fake Kerberos ticket for Windows, in order to obtain privileges of the domain administrator...
3011780, c04526330, CERTFR-2014-ALE-011, CERTFR-2014-AVI-489, CVE-2014-6324, HPSBMU03224, MS14-068, VIGILANCE-VUL-15667, VU#213119
HP LoadRunner: multiple vulnerabilities of Virtual User Generator
An attacker can use several vulnerabilities of Virtual User Generator of HP LoadRunner...
BID-63475, BID-63476, BID-63477, c03969437, CVE-2013-4837, CVE-2013-4838, CVE-2013-4839, CVE-2013-6213, HPSBMU02935, SSRT101191, SSRT101192, SSRT101193, SSRT101357, VIGILANCE-VUL-13687, ZDI-14-100, ZDI-CAN-1832, ZDI-CAN-1833, ZDI-CAN-1850, ZDI-CAN-1851
OpenSSL: information disclosure via Heartbeat
An attacker can use the Heartbeat protocol on an application compiled with OpenSSL, in order to obtain sensitive information, such as keys stored in memory...
1669839, 190438, 2076225, 2962393, c04236102, c04267775, c04286049, CA20140413-01, CERTFR-2014-ALE-003, CERTFR-2014-AVI-156, CERTFR-2014-AVI-161, CERTFR-2014-AVI-162, CERTFR-2014-AVI-167, CERTFR-2014-AVI-169, CERTFR-2014-AVI-177, CERTFR-2014-AVI-178, CERTFR-2014-AVI-179, CERTFR-2014-AVI-180, CERTFR-2014-AVI-181, CERTFR-2014-AVI-198, CERTFR-2014-AVI-199, CERTFR-2014-AVI-213, cisco-sa-20140409-heartbleed, CTX140605, CVE-2014-0160, CVE-2014-0346-REJECT, DSA-2896-1, DSA-2896-2, emr_na-c04236102-7, ESA-2014-034, ESA-2014-036, ESA-2014-075, FEDORA-2014-4879, FEDORA-2014-4910, FEDORA-2014-4982, FEDORA-2014-4999, FG-IR-14-011, FreeBSD-SA-14:06.openssl, Heartbleed, HPSBMU02995, HPSBMU03025, HPSBMU03040, ICSA-14-105-03, JSA10623, MDVSA-2014:123, MDVSA-2015:062, NetBSD-SA2014-004, openSUSE-SU-2014:0492-1, openSUSE-SU-2014:0560-1, openSUSE-SU-2014:0719-1, pfSense-SA-14_04.openssl, RHSA-2014:0376-01, RHSA-2014:0377-01, RHSA-2014:0378-01, RHSA-2014:0396-01, RHSA-2014:0416-01, SA40005, SA79, SB10071, SOL15159, SPL-82696, SSA:2014-098-01, SSA-635659, SSRT101565, USN-2165-1, VIGILANCE-VUL-14534, VMSA-2014-0004, VMSA-2014-0004.1, VMSA-2014-0004.2, VMSA-2014-0004.3, VMSA-2014-0004.6, VMSA-2014-0004.7, VU#720951
HP LoadRunner: multiple vulnerabilities
An attacker can use several vulnerabilities of HP LoadRunner...
BID-61436, BID-61437, BID-61441, BID-61442, BID-61443, BID-61444, BID-61445, BID-61446, c03862772, CERTA-2013-AVI-441, CVE-2013-2368, CVE-2013-2369, CVE-2013-2370, CVE-2013-4797, CVE-2013-4798, CVE-2013-4799, CVE-2013-4800, CVE-2013-4801, HPSBGN02905, SSRT101074, SSRT101081, SSRT101082, SSRT101083, SSRT101084, SSRT101085, SSRT101114, SSRT101117, VIGILANCE-VUL-13164, ZDI-13-169, ZDI-13-182, ZDI-13-202, ZDI-13-203, ZDI-13-206, ZDI-13-207, ZDI-13-208, ZDI-13-209, ZDI-CAN-1669, ZDI-CAN-1670, ZDI-CAN-1671, ZDI-CAN-1690, ZDI-CAN-1705, ZDI-CAN-1734, ZDI-CAN-1735, ZDI-CAN-1736
HP Diagnostics Server, LoadRunner: buffer overflow via magentservice.exe
An unauthenticated attacker can send a malicious packet to HP Diagnostics Server or LoadRunner, in order to generate a buffer overflow, leading to a denial of service or to code execution...
BID-51398, c03216705, CVE-2011-4789, HPSBMU02785, SSRT100526, VIGILANCE-VUL-11281, ZDI-12-016
HP LoadRunner: buffer overflow via Virtual User
An attacker can create a malicious Virtual User file, in order to create a buffer overflow in HP LoadRunner, and to execute code...
BID-48073, c03216705, CVE-2011-2328, HPSBMU02785, SSRT100526, VIGILANCE-VUL-10721, VU#987308
HP LoadRunner, Performance Center: code execution
An attacker can generate a buffer overflow in the magentproc.exe process, in order to execute code with SYSTEM privileges...
BID-45792, c02680678, CERTA-2011-AVI-019, CVE-2011-0272, HPSBMA02624, SSRT100195, VIGILANCE-VUL-10296, ZDI-11-015
Our database contains other pages. You can request a free trial to read them.

Display information about Micro Focus LoadRunner: