Filtered by vendor Suse Subscriptions
Total 1185 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-0363 2 Plp, Suse 2 Line Printer Control, Suse Linux 2025-04-03 N/A
SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise.
CVE-1999-0234 5 Caldera, Redhat, Sgi and 2 more 5 Openlinux, Linux, Irix and 2 more 2025-04-03 N/A
Bash treats any character with a value of 255 as a command separator.
CVE-2000-0233 1 Suse 1 Suse Linux Imap Server 2025-04-03 N/A
SuSE Linux IMAP server allows remote attackers to bypass IMAP authentication and gain privileges.
CVE-2000-0231 2 Halloween, Suse 2 Halloween Linux, Suse Linux 2025-04-03 N/A
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges.
CVE-2000-0218 2 Caldera, Suse 2 Openlinux, Suse Linux 2025-04-03 N/A
Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname.
CVE-1999-1495 1 Suse 1 Suse Linux 2025-04-03 N/A
xtvscreen in SuSE Linux 6.0 allows local users to overwrite arbitrary files via a symlink attack on the pic000.pnm file.
CVE-1999-1182 6 Caldera, Debian, Delix and 3 more 6 Openlinux Lite, Debian Linux, Dld and 3 more 2025-04-03 N/A
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
CVE-1999-0906 1 Suse 1 Suse Linux 2025-04-03 N/A
Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable.
CVE-1999-0768 2 Redhat, Suse 2 Linux, Suse Linux 2025-04-03 N/A
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.
CVE-1999-0746 2 Slackware, Suse 2 Slackware Linux, Suse Linux 2025-04-03 N/A
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service.
CVE-2000-0666 5 Conectiva, Debian, Redhat and 2 more 5 Linux, Debian Linux, Linux and 2 more 2025-04-03 N/A
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
CVE-2000-1040 1 Suse 1 Suse Linux 2025-04-03 N/A
Format string vulnerability in logging function of ypbind 3.3, while running in debug mode, leaks file descriptors and allows an attacker to cause a denial of service.
CVE-1999-0390 2 Redhat, Suse 2 Linux, Suse Linux 2025-04-03 N/A
Buffer overflow in Dosemu Slang library in Linux.
CVE-1999-0409 1 Suse 1 Suse Linux 2025-04-03 N/A
Buffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access.
CVE-2000-0844 13 Caldera, Conectiva, Debian and 10 more 16 Openlinux, Openlinux Ebuilder, Openlinux Eserver and 13 more 2025-04-03 N/A
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
CVE-2006-2752 1 Suse 1 Suse Linux 2025-04-03 N/A
The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password.
CVE-2006-2703 1 Suse 1 Suse Linux 2025-04-03 N/A
The RedCarpet command-line client (rug) does not verify SSL certificates from a server, which allows remote attackers to read network traffic and execute commands via a man-in-the-middle (MITM) attack.
CVE-2006-2658 2 Mono, Suse 3 Xsp, Suse Linux, Suse Open Enterprise Server 2025-04-03 N/A
Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request.
CVE-2006-0803 2 Novell, Suse 2 Suse Linux, Suse Linux 2025-04-03 N/A
The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used.
CVE-2006-0745 5 Mandrakesoft, Redhat, Sun and 2 more 6 Mandrake Linux, Fedora Core, Solaris and 3 more 2025-04-03 N/A
X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.