Page 14 of 84 results (0.003 seconds)

CVSS: 1.2EPSS: 0%CPEs: 5EXPL: 4

rctab in SuSE 7.0 and earlier allows local users to create or overwrite arbitrary files via a symlink attack on the rctmp temporary file. • https://www.exploit-db.com/exploits/20554 https://www.exploit-db.com/exploits/20555 http://archives.neohapsis.com/archives/bugtraq/2001-01/0226.html http://archives.neohapsis.com/archives/bugtraq/2001-01/0272.html http://www.securityfocus.com/bid/2207 https://exchange.xforce.ibmcloud.com/vulnerabilities/5945 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 1

in.identd ident server in SuSE Linux 6.x and 7.0 allows remote attackers to cause a denial of service via a long request, which causes the server to access a NULL pointer and crash. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0387.html http://www.securityfocus.com/bid/2015 https://exchange.xforce.ibmcloud.com/vulnerabilities/5590 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

Format string vulnerability in logging function of ypbind 3.3, while running in debug mode, leaks file descriptors and allows an attacker to cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0356.html http://archives.neohapsis.com/archives/bugtraq/2000-10/0429.html http://archives.neohapsis.com/archives/linux/suse/2000-q4/0262.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-039.0.txt http://www.debian.org/security/2000/20001014 http://www.linux-mandrake.com/en/security/MDKSA-2000-064.php3?dis=7.1 http://www.redhat.com/support/errata/RHSA-2000-086.html http://www.securityfocus.com/bid&# •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Format string vulnerability in ypbind-mt in SuSE SuSE-6.2, and possibly other Linux operating systems, allows an attacker to gain root privileges. • http://archives.neohapsis.com/archives/linux/suse/2000-q4/0262.html http://www.securityfocus.com/bid/1820 https://exchange.xforce.ibmcloud.com/vulnerabilities/5394 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 2

The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL. • https://www.exploit-db.com/exploits/20236 http://www.securityfocus.com/archive/1/84360 http://www.securityfocus.com/bid/1707 https://exchange.xforce.ibmcloud.com/vulnerabilities/5276 •