Page 4 of 206 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2005 — resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, allows local users to bypass access control rules for USB devices via "alternate syntax for specifying USB devices." • http://www.novell.com/linux/security/advisories/2005_22_sr.html •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2005 — resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, does not properly enforce class-specific exclude rules in some situations, which allows local users to bypass intended access restrictions for USB devices that set their class ID at the interface level. • http://www.novell.com/linux/security/advisories/2005_22_sr.html •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2005 — Multiple untrusted search path vulnerabilities in SUSE Linux 9.3 and 10.0, and possibly other distributions, cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) beagle, (2) tomboy, or (3) blam. NOTE: in August 2007, the tomboy vector was reported for other distributions. • http://bugs.gentoo.org/show_bug.cgi?id=188806 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2005 — Multiple untrusted search path vulnerabilities in SUSE Linux 10.0 cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) liferea or (2) banshee. • http://osvdb.org/39580 •

CVSS: 7.1EPSS: 0%CPEs: 9EXPL: 0

27 Oct 2005 — chkstat in SuSE Linux 9.0 through 10.0 allows local users to modify permissions of files by creating a hardlink to a file from a world-writable directory, which can cause the link count to drop to 1 when the file is deleted or replaced, which is then modified by chkstat to use weaker permissions. • http://secunia.com/advisories/17290 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

27 Oct 2005 — Unspecified vulnerability in Squid on SUSE Linux 9.0 allows remote attackers to cause a denial of service (crash) via HTTPs (SSL). • http://www.novell.com/linux/security/advisories/2005_24_sr.html •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 0

23 Oct 2005 — Multiple integer overflows in OpenWBEM on SuSE Linux 9 allow remote attackers to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/17176 •

CVSS: 9.8EPSS: 8%CPEs: 1EXPL: 0

23 Oct 2005 — Multiple buffer overflows in OpenWBEM on SuSE Linux 9 allow remote attackers to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/17176 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

21 Sep 2005 — Buffer overflow in liby2util in Yet another Setup Tool (YaST) for SuSE Linux 9.3 allows local users to execute arbitrary code via a long Loc entry. • http://www.novell.com/linux/security/advisories/2005_22_sr.html •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 0

05 Aug 2005 — Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function. Vulnerabilidad desconocida en el kernel de Linux permite que usuarios locales provoquen una denegación de servicio mediante ptrace • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ea78729b8dbfc400fe165a57b90a394a7275a54 • CWE-20: Improper Input Validation •