Page 6 of 69 results (0.013 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The signature verification functionality in the YaST Online Update (YOU) script handling relies on a gpg feature that is not intended for signature verification, which prevents YOU from detecting malicious scripts or code that do not pass the signature check when gpg 1.4.x is being used. • http://www.novell.com/linux/security/advisories/2006_09_gpg.html http://www.novell.com/linux/security/advisories/2006_13_gpg.html http://www.securityfocus.com/bid/16889 •

CVSS: 4.4EPSS: 0%CPEs: 11EXPL: 0

ld in SUSE Linux 9.1 through 10.0, and SLES 9, in certain circumstances when linking binaries, can leave an empty RPATH or RUNPATH, which allows local attackers to execute arbitrary code as other users via by running an ld-linked application from the current directory, which could contain an attacker-controlled library file. • http://lists.suse.com/archive/suse-security-announce/2006-Feb/0003.html http://secunia.com/advisories/18811 http://www.securityfocus.com/bid/16581 •

CVSS: 4.6EPSS: 0%CPEs: 11EXPL: 0

Buffer overflow in the realpath function in nfs-server rpc.mountd, as used in SUSE Linux 9.1 through 10.0, allows local users to execute arbitrary code via unspecified vectors involving mount requests and symlinks. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020 http://lists.suse.com/archive/suse-security-announce/2006-Jan/0007.html http://secunia.com/advisories/18614 http://secunia.com/advisories/18638 http://secunia.com/advisories/18889 http://www.debian.org/security/2006/dsa-975 http://www.securityfocus.com/bid/16388 http://www.vupen.com/english/advisories/2006/0348 https://exchange.xforce.ibmcloud.com/vulnerabilities/24347 •

CVSS: 6.4EPSS: 0%CPEs: 25EXPL: 0

liby2util in Yet another Setup Tool (YaST) in SUSE Linux before 20051007 preserves permissions and ownerships when copying a remote repository, which might allow local users to read or modify sensitive files, possibly giving local users the ability to exploit CVE-2005-3013. • http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/15026 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Multiple untrusted search path vulnerabilities in SUSE Linux 10.0 cause the working directory to be added to LD_LIBRARY_PATH, which might allow local users to execute arbitrary code via (1) liferea or (2) banshee. • http://osvdb.org/39580 http://secunia.com/advisories/27771 http://sourceforge.net/project/shownotes.php?release_id=555823&group_id=87005 http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/15040 http://www.vupen.com/english/advisories/2007/3965 •