Page 6 of 206 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 127EXPL: 1

Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html http://rhn.redhat.com/errata/RHSA-2006-0177.html http://scary.beasts.org/security/CESA-2005-003.txt http://secunia.com/ • CWE-399: Resource Management Errors •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, allows local users to bypass access control rules for USB devices via "alternate syntax for specifying USB devices." • http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/15037 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

The powersave daemon in SUSE Linux 10.0 before 20051007 has an unspecified "configuration problem," which allows local users to suspend the computer and possibly perform certain other unauthorized actions. • http://lists.suse.com/archive/suse-security-announce/2005-Oct/0002.html http://www.securityfocus.com/bid/15042 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Multiple untrusted search path vulnerabilities in SUSE Linux 10.0 cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) liferea or (2) banshee. • http://osvdb.org/39580 http://secunia.com/advisories/27771 http://sourceforge.net/project/shownotes.php?release_id=555823&group_id=87005 http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/15040 http://www.vupen.com/english/advisories/2007/3965 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

resmgr in SUSE Linux 9.2 and 9.3, and possibly other distributions, does not properly enforce class-specific exclude rules in some situations, which allows local users to bypass intended access restrictions for USB devices that set their class ID at the interface level. • http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/15037 •