Page 8 of 206 results (0.009 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Unspecified vulnerability in Squid on SUSE Linux 9.0 allows remote attackers to cause a denial of service (crash) via HTTPs (SSL). • http://www.novell.com/linux/security/advisories/2005_24_sr.html http://www.novell.com/linux/security/advisories/2005_28_sr.html http://www.securityfocus.com/bid/15165 •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 0

Multiple buffer overflows in OpenWBEM on SuSE Linux 9 allow remote attackers to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/17176 http://secunia.com/advisories/17244 http://www.novell.com/linux/security/advisories/2005_60_OpenWBEM.html http://www.osvdb.org/20062 http://www.securityfocus.com/bid/15121 https://exchange.xforce.ibmcloud.com/vulnerabilities/22749 •

CVSS: 7.5EPSS: 9%CPEs: 1EXPL: 0

Multiple integer overflows in OpenWBEM on SuSE Linux 9 allow remote attackers to execute arbitrary code via unknown vectors. • http://secunia.com/advisories/17176 http://secunia.com/advisories/17244 http://www.novell.com/linux/security/advisories/2005_60_OpenWBEM.html http://www.osvdb.org/20062 http://www.securityfocus.com/bid/15121 https://exchange.xforce.ibmcloud.com/vulnerabilities/22749 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in liby2util in Yet another Setup Tool (YaST) for SuSE Linux 9.3 allows local users to execute arbitrary code via a long Loc entry. • http://www.novell.com/linux/security/advisories/2005_22_sr.html http://www.securityfocus.com/bid/14861 https://exchange.xforce.ibmcloud.com/vulnerabilities/24323 •

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 0

Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function. Vulnerabilidad desconocida en el kernel de Linux permite que usuarios locales provoquen una denegación de servicio mediante ptrace • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ea78729b8dbfc400fe165a57b90a394a7275a54 http://secunia.com/advisories/17002 http://secunia.com/advisories/17073 http://secunia.com/advisories/18056 http://secunia.com/advisories/19369 http://securitytracker.com/id?1014275 http://www.debian.org/security/2005/dsa-922 http://www.debian.org/security/2006/dsa-1018 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1 http://www.novell&# • CWE-20: Improper Input Validation •