Vulnerabilities
Vulnerable Software
Suse:  >> Suse Linux  Security Vulnerabilities
Sdbsearch.cgi in SuSE Linux 6.0-7.2 could allow remote attackers to execute arbitrary commands by uploading a keylist.txt file that contains filenames with shell metacharacters, then causing the file to be searched using a .. in the HTTP referer (from the HTTP_REFERER variable) to point to the directory that contains the keylist.txt file.
CVSS Score
7.5
EPSS Score
0.044
Published
2001-08-02
time server daemon timed allows remote attackers to cause a denial of service via malformed packets.
CVSS Score
10.0
EPSS Score
0.01
Published
2001-06-27
Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands.
CVSS Score
7.5
EPSS Score
0.017
Published
2001-06-27
Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter.
CVSS Score
7.2
EPSS Score
0.002
Published
2001-05-03
Buffer overflow in ReiserFS 3.5.28 in SuSE Linux allows local users to cause a denial of service and possibly execute arbitrary commands by via a long directory name.
CVSS Score
7.2
EPSS Score
0.003
Published
2001-03-26
kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.
CVSS Score
2.1
EPSS Score
0.001
Published
2001-03-26
rctab in SuSE 7.0 and earlier allows local users to create or overwrite arbitrary files via a symlink attack on the rctmp temporary file.
CVSS Score
1.2
EPSS Score
0.001
Published
2001-03-12
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
CVSS Score
7.2
EPSS Score
0.002
Published
2001-01-09
in.identd ident server in SuSE Linux 6.x and 7.0 allows remote attackers to cause a denial of service via a long request, which causes the server to access a NULL pointer and crash.
CVSS Score
5.0
EPSS Score
0.009
Published
2001-01-09
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
CVSS Score
7.2
EPSS Score
0.002
Published
2001-01-09


Contact Us

Shodan ® - All rights reserved