Filtered by vendor Suse
Subscriptions
Filtered by product Suse Linux
Subscriptions
Total
214 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2005-4772 | 1 Suse | 5 Suse Linux, Suse Linux Openexchange Server, Suse Linux School Server and 2 more | 2025-04-03 | N/A |
liby2util in Yet another Setup Tool (YaST) in SUSE Linux before 20051007 preserves permissions and ownerships when copying a remote repository, which might allow local users to read or modify sensitive files, possibly giving local users the ability to exploit CVE-2005-3013. | ||||
CVE-2005-4778 | 1 Suse | 2 Suse Linux, Suse Sled Beagle | 2025-04-03 | N/A |
The powersave daemon in SUSE Linux 10.0 before 20051007 has an unspecified "configuration problem," which allows local users to suspend the computer and possibly perform certain other unauthorized actions. | ||||
CVE-2005-4788 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, allows local users to bypass access control rules for USB devices via "alternate syntax for specifying USB devices." | ||||
CVE-2005-4789 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, does not properly enforce class-specific exclude rules in some situations, which allows local users to bypass intended access restrictions for USB devices that set their class ID at the interface level. | ||||
CVE-2005-4790 | 2 Novell, Suse | 2 Suse Linux, Suse Linux | 2025-04-03 | N/A |
Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions. | ||||
CVE-2006-0043 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks. | ||||
CVE-2006-0646 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. | ||||
CVE-2006-0745 | 5 Mandrakesoft, Redhat, Sun and 2 more | 6 Mandrake Linux, Fedora Core, Solaris and 3 more | 2025-04-03 | N/A |
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. | ||||
CVE-2006-0803 | 2 Novell, Suse | 2 Suse Linux, Suse Linux | 2025-04-03 | N/A |
The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. | ||||
CVE-2006-2658 | 2 Mono, Suse | 3 Xsp, Suse Linux, Suse Open Enterprise Server | 2025-04-03 | N/A |
Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request. | ||||
CVE-2006-2703 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
The RedCarpet command-line client (rug) does not verify SSL certificates from a server, which allows remote attackers to read network traffic and execute commands via a man-in-the-middle (MITM) attack. | ||||
CVE-2006-2752 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password. | ||||
CVE-2005-0638 | 4 Altlinux, Redhat, Suse and 1 more | 4 Alt Linux, Enterprise Linux, Suse Linux and 1 more | 2025-04-03 | N/A |
xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command. | ||||
CVE-1999-0363 | 2 Plp, Suse | 2 Line Printer Control, Suse Linux | 2025-04-03 | N/A |
SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise. | ||||
CVE-1999-0390 | 2 Redhat, Suse | 2 Linux, Suse Linux | 2025-04-03 | N/A |
Buffer overflow in Dosemu Slang library in Linux. | ||||
CVE-1999-0405 | 4 Debian, Freebsd, Redhat and 1 more | 4 Debian Linux, Freebsd, Linux and 1 more | 2025-04-03 | N/A |
A buffer overflow in lsof allows local users to obtain root privilege. | ||||
CVE-1999-0409 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
Buffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access. | ||||
CVE-1999-0426 | 1 Suse | 1 Suse Linux | 2025-04-03 | 9.8 Critical |
The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing. | ||||
CVE-1999-0433 | 5 Netbsd, Redhat, Slackware and 2 more | 5 Netbsd, Linux, Slackware Linux and 2 more | 2025-04-03 | N/A |
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. | ||||
CVE-1999-0434 | 5 Caldera, Debian, Netbsd and 2 more | 5 Openlinux, Debian Linux, Netbsd and 2 more | 2025-04-03 | N/A |
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. |