CVE-2007-0460
https://notcve.org/view.php?id=CVE-2007-0460
Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations." Múltiples desbordamientos de búfer en ulogd para SUSE Linux versiones 9.3 hasta 10.1, y posiblemente otras distribuciones, presenta un impacto desconocido y vectores de ataque relacionados con "improper string length calculations." • http://osvdb.org/32939 http://secunia.com/advisories/23863 http://secunia.com/advisories/24524 http://security.gentoo.org/glsa/glsa-200703-17.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:028 http://www.novell.com/linux/security/advisories/2007_01_sr.html http://www.securityfocus.com/bid/22139 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-5616
https://notcve.org/view.php?id=CVE-2006-5616
Multiple unspecified vulnerabilities in OpenPBS, as used in SUSE Linux 9.2 through 10.1, allow attackers to execute arbitrary code via unspecified vectors. Múltiples vulnerabilidades no especificadas en OpenPBS, tal y como se usa en SUSE Linux 9.2 hasta la 10.1, permite a un atacante ejecutar código de su elección a través de vectores no especificados. • http://lists.suse.com/archive/suse-security-announce/2006-Oct/0007.html http://secunia.com/advisories/22637 http://secunia.com/advisories/24716 http://security.gentoo.org/glsa/glsa-200704-04.xml http://www.securityfocus.com/bid/20776 http://www.vupen.com/english/advisories/2006/4250 https://exchange.xforce.ibmcloud.com/vulnerabilities/29944 •
CVE-2006-2658
https://notcve.org/view.php?id=CVE-2006-2658
Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request. Vulnerabilidad de atravesamiento de directorios en el componente xsp en mod_mono en Mono/C# web server, es usado en SUSE Open-Enterprise-Server 1 y SUSE Linux 9.2 hasta la 10.0, permite a un atacante remoto leer ficheros de su elección a través de la secuencia ..(punto punto)en una respueta HTTP. • http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html http://secunia.com/advisories/21840 http://secunia.com/advisories/21847 http://securitytracker.com/id?1016821 http://www.securityfocus.com/bid/19929 http://www.vupen.com/english/advisories/2006/3552 •
CVE-2006-0803
https://notcve.org/view.php?id=CVE-2006-0803
The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. • http://www.novell.com/linux/security/advisories/2006_09_gpg.html http://www.novell.com/linux/security/advisories/2006_13_gpg.html http://www.securityfocus.com/bid/16889 •
CVE-2006-0646
https://notcve.org/view.php?id=CVE-2006-0646
ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. • http://lists.suse.com/archive/suse-security-announce/2006-Feb/0003.html http://secunia.com/advisories/18811 http://www.securityfocus.com/bid/16581 •