Page 3 of 206 results (0.004 seconds)

CVSS: 7.7EPSS: 0%CPEs: 2EXPL: 0

01 Jun 2006 — The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password. El RedCarpet /etc/Ximian/rcd.conf, archivo de configuración en Novell Linux Desktop 9 y SUSE SLES 9 tiene permisos de lectura en todo el mundo, lo que permite a los atacantes obtener el rc (RedCarpet) contraseña. • http://secunia.com/advisories/20396 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 2

21 Mar 2006 — X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

23 Feb 2006 — The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. • http://www.novell.com/linux/security/advisories/2006_09_gpg.html •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

11 Feb 2006 — ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. • http://lists.suse.com/archive/suse-security-announce/2006-Feb/0003.html •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

31 Jan 2006 — Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020 •

CVSS: 9.1EPSS: 7%CPEs: 127EXPL: 1

31 Dec 2005 — The CCITTFaxStream::CCITTFaxStream function in Stream.cc for xpdf, gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others allows attackers to corrupt the heap via negative or large integers in a CCITTFaxDecode stream, which lead to integer overflows and integer underflows. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 11%CPEs: 127EXPL: 1

31 Dec 2005 — Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 9%CPEs: 127EXPL: 1

31 Dec 2005 — Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 25EXPL: 0

31 Dec 2005 — liby2util in Yet another Setup Tool (YaST) in SUSE Linux before 20051007 preserves permissions and ownerships when copying a remote repository, which might allow local users to read or modify sensitive files, possibly giving local users the ability to exploit CVE-2005-3013. • http://www.novell.com/linux/security/advisories/2005_22_sr.html •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2005 — The powersave daemon in SUSE Linux 10.0 before 20051007 has an unspecified "configuration problem," which allows local users to suspend the computer and possibly perform certain other unauthorized actions. • http://lists.suse.com/archive/suse-security-announce/2005-Oct/0002.html •