Filtered by vendor Suse Subscriptions
Filtered by product Suse Linux Subscriptions
Total 217 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0768 2 Redhat, Suse 2 Linux, Suse Linux 2025-04-03 N/A
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.
CVE-1999-0906 1 Suse 1 Suse Linux 2025-04-03 N/A
Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable.
CVE-1999-1182 6 Caldera, Debian, Delix and 3 more 6 Openlinux Lite, Debian Linux, Dld and 3 more 2025-04-03 N/A
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
CVE-2000-0340 1 Suse 1 Suse Linux 2025-04-03 N/A
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.
CVE-2000-0355 3 Bent Bagger, Redhat, Suse 3 Pbpg, Linux, Suse Linux 2025-04-03 N/A
pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files.
CVE-2000-0361 1 Suse 1 Suse Linux 2025-04-03 N/A
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information.
CVE-2000-0362 1 Suse 1 Suse Linux 2025-04-03 N/A
Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges.
CVE-2000-0363 1 Suse 1 Suse Linux 2025-04-03 N/A
Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory.
CVE-2000-0433 1 Suse 1 Suse Linux 2025-04-03 N/A
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles.
CVE-2000-0438 4 Caldera, Slackware, Suse and 1 more 4 Openlinux, Slackware Linux, Suse Linux and 1 more 2025-04-03 N/A
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
CVE-2000-0614 1 Suse 1 Suse Linux 2025-04-03 N/A
Tnef program in Linux systems allows remote attackers to overwrite arbitrary files via TNEF encoded compressed attachments which specify absolute path names for the decompressed output.
CVE-2000-0868 2 Apache, Suse 2 Http Server, Suse Linux 2025-04-03 N/A
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.
CVE-2000-0869 2 Apache, Suse 2 Http Server, Suse Linux 2025-04-03 N/A
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary directories via the PROPFIND HTTP request method.
CVE-2000-1016 1 Suse 1 Suse Linux 2025-04-03 N/A
The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL.
CVE-2000-1044 1 Suse 1 Suse Linux 2025-04-03 N/A
Format string vulnerability in ypbind-mt in SuSE SuSE-6.2, and possibly other Linux operating systems, allows an attacker to gain root privileges.
CVE-2000-1107 1 Suse 1 Suse Linux 2025-04-03 N/A
in.identd ident server in SuSE Linux 6.x and 7.0 allows remote attackers to cause a denial of service via a long request, which causes the server to access a NULL pointer and crash.
CVE-2017-3224 3 Quagga, Redhat, Suse 4 Quagga, Package Manager, Opensuse and 1 more 2024-11-21 N/A
Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages).