Page 220 of 1170 results (0.007 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The Live CD in SUSE LINUX 9.1 Personal edition is configured without a password for root, which allows remote attackers to gain privileges via SSH. • http://www.securityfocus.com/bid/10297 http://www.suse.de/de/security/2004_11_live_cd_91.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16084 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The SuSEconfig.gnome-filesystem script for YaST in SuSE 9.0 allows local users to overwrite arbitrary files via a symlink attack on files within the tmp.SuSEconfig.gnome-filesystem.$RANDOM temporary directory. El script SuSEconfig.gnome-filesystem de Yast de SuSE 9.0 permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en ficheros el el directorio temporal tmp.SuSEconfig.gnome-filesystem.$RANDOM. • https://www.exploit-db.com/exploits/144 http://marc.info/?l=bugtraq&m=107402658600437&w=2 http://secunia.com/advisories/10623 http://www.osvdb.org/3460 http://www.securityfocus.com/bid/9411 http://www.securitytracker.com/id?1008703 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in xscreensaver 4.12, and possibly other versions, allows attackers to cause xscreensaver to crash via unspecified vectors "while verifying the user-password." • http://www.novell.com/linux/download/updates/90_i386.html http://www.securityfocus.com/bid/9125 •

CVSS: 6.4EPSS: 0%CPEs: 4EXPL: 0

susehelp in SuSE Linux 8.1, Enterprise Server 8, Office Server, and Openexchange Server 4 does not properly filter shell metacharacters, which allows remote attackers to execute arbitrary commands via CGI queries. • http://secunia.com/advisories/7906 http://www.novell.com/linux/security/advisories/2003_005_susehelp.html http://www.securitytracker.com/id?1005954 • CWE-20: Improper Input Validation •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

SuSEconfig.susewm in the susewm package on SuSE Linux 8.2Pro allows local users to overwrite arbitrary files via a symlink attack on the susewm.$$ temporary file. SuSEconfig.susewm en el paquete susewm en SuSE Linux 8.2Pro permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos sobre el fichero temporal susewm.$$. • https://www.exploit-db.com/exploits/23223 http://marc.info/?l=bugtraq&m=106545972615578&w=2 http://marc.info/?l=bugtraq&m=106546531922379&w=2 •