Page 4 of 206 results (0.010 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations." Múltiples desbordamientos de búfer en ulogd para SUSE Linux versiones 9.3 hasta 10.1, y posiblemente otras distribuciones, presenta un impacto desconocido y vectores de ataque relacionados con "improper string length calculations." • http://osvdb.org/32939 http://secunia.com/advisories/23863 http://secunia.com/advisories/24524 http://security.gentoo.org/glsa/glsa-200703-17.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:028 http://www.novell.com/linux/security/advisories/2007_01_sr.html http://www.securityfocus.com/bid/22139 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.1EPSS: 0%CPEs: 3EXPL: 0

Unspecified vulnerability in Linux User Management (novell-lum) on SUSE Linux Enterprise Desktop 10 and Open Enterprise Server 9, under unspecified conditions, allows local users to log in to the console without a password. Vulnerabilidad sin especificar en el Linux User Management (novell-lum) de SUSE Linux Enterprise Desktop 10 y Open Enterprise Server 9, bajo condiciones sin especificar, permite a usuarios locales validarse en la consola sin contraseña. • http://secunia.com/advisories/23409 http://www.novell.com/linux/security/advisories/2006_29_sr.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 1%CPEs: 10EXPL: 0

Multiple unspecified vulnerabilities in OpenPBS, as used in SUSE Linux 9.2 through 10.1, allow attackers to execute arbitrary code via unspecified vectors. Múltiples vulnerabilidades no especificadas en OpenPBS, tal y como se usa en SUSE Linux 9.2 hasta la 10.1, permite a un atacante ejecutar código de su elección a través de vectores no especificados. • http://lists.suse.com/archive/suse-security-announce/2006-Oct/0007.html http://secunia.com/advisories/22637 http://secunia.com/advisories/24716 http://security.gentoo.org/glsa/glsa-200704-04.xml http://www.securityfocus.com/bid/20776 http://www.vupen.com/english/advisories/2006/4250 https://exchange.xforce.ibmcloud.com/vulnerabilities/29944 •

CVSS: 5.0EPSS: 0%CPEs: 12EXPL: 0

Directory traversal vulnerability in the xsp component in mod_mono in Mono/C# web server, as used in SUSE Open-Enterprise-Server 1 and SUSE Linux 9.2 through 10.0, allows remote attackers to read arbitrary files via a .. (dot dot) sequence in an HTTP request. Vulnerabilidad de atravesamiento de directorios en el componente xsp en mod_mono en Mono/C# web server, es usado en SUSE Open-Enterprise-Server 1 y SUSE Linux 9.2 hasta la 10.0, permite a un atacante remoto leer ficheros de su elección a través de la secuencia ..(punto punto)en una respueta HTTP. • http://lists.suse.com/archive/suse-security-announce/2006-Sep/0005.html http://secunia.com/advisories/21840 http://secunia.com/advisories/21847 http://securitytracker.com/id?1016821 http://www.securityfocus.com/bid/19929 http://www.vupen.com/english/advisories/2006/3552 •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 0

The RedCarpet /etc/ximian/rcd.conf configuration file in Novell Linux Desktop 9 and SUSE SLES 9 has world-readable permissions, which allows attackers to obtain the rc (RedCarpet) password. El RedCarpet /etc/Ximian/rcd.conf, archivo de configuración en Novell Linux Desktop 9 y SUSE SLES 9 tiene permisos de lectura en todo el mundo, lo que permite a los atacantes obtener el rc (RedCarpet) contraseña. • http://secunia.com/advisories/20396 http://www.securityfocus.com/archive/1/435491/100/0/threaded •