Page 5 of 206 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The RedCarpet command-line client (rug) does not verify SSL certificates from a server, which allows remote attackers to read network traffic and execute commands via a man-in-the-middle (MITM) attack. • http://secunia.com/advisories/20396 http://www.securityfocus.com/archive/1/435491/100/0/threaded http://www.securityfocus.com/bid/18193 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile. • https://www.exploit-db.com/exploits/1596 http://secunia.com/advisories/19256 http://secunia.com/advisories/19307 http://secunia.com/advisories/19311 http://secunia.com/advisories/19316 http://secunia.com/advisories/19676 http://securityreason.com/securityalert/606 http://securitytracker.com/id?1015793 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102252-1 http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm http://www.mandriva.com/security/advisories?name=MDKSA •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. • http://www.novell.com/linux/security/advisories/2006_09_gpg.html http://www.novell.com/linux/security/advisories/2006_13_gpg.html http://www.securityfocus.com/bid/16889 •

CVSS: 4.4EPSS: 0%CPEs: 11EXPL: 0

ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. • http://lists.suse.com/archive/suse-security-announce/2006-Feb/0003.html http://secunia.com/advisories/18811 http://www.securityfocus.com/bid/16581 •

CVSS: 4.6EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020 http://lists.suse.com/archive/suse-security-announce/2006-Jan/0007.html http://secunia.com/advisories/18614 http://secunia.com/advisories/18638 http://secunia.com/advisories/18889 http://www.debian.org/security/2006/dsa-975 http://www.securityfocus.com/bid/16388 http://www.vupen.com/english/advisories/2006/0348 https://exchange.xforce.ibmcloud.com/vulnerabilities/24347 •