Show filters
556 Total Results
Displaying 21-30 of 556
Sort by:
Attacker Value
Unknown

CVE-2006-7246

Disclosure Date: January 27, 2020 (last updated February 21, 2025)
NetworkManager 0.9.x does not pin a certificate's subject to an ESSID when 802.11X authentication is used.
Attacker Value
Unknown

CVE-2013-4357

Disclosure Date: December 31, 2019 (last updated November 27, 2024)
The eglibc package before 2.14 incorrectly handled the getaddrinfo() function. An attacker could use this issue to cause a denial of service.
Attacker Value
Unknown

CVE-2011-1145

Disclosure Date: November 14, 2019 (last updated November 27, 2024)
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
Attacker Value
Unknown

CVE-2010-4661

Disclosure Date: November 13, 2019 (last updated November 27, 2024)
udisks before 1.0.3 allows a local user to load arbitrary Linux kernel modules.
Attacker Value
Unknown

CVE-2018-19655

Disclosure Date: November 29, 2018 (last updated November 08, 2023)
A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.
0
Attacker Value
Unknown

CVE-2018-19208

Disclosure Date: November 12, 2018 (last updated November 27, 2024)
In libwpd 0.10.2, there is a NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp that will lead to a denial of service attack. This is related to WPXTable.h.
Attacker Value
Unknown

CVE-2018-19052

Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
Attacker Value
Unknown

The lxc-user-nic component of LXC allows unprivileged users to open arbitrary f…

Disclosure Date: August 10, 2018 (last updated November 27, 2024)
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
0
Attacker Value
Unknown

Missing verification of host key for kdump server

Disclosure Date: June 08, 2018 (last updated November 08, 2023)
The kdump implementation is missing the host key verification in the kdump and mkdumprd OpenSSH integration of kdump prior to version 2012-01-20. This is similar to CVE-2011-3588, but different in that the kdump implementation is specific to SUSE. A remote malicious kdump server could use this flaw to impersonate the correct kdump server to obtain security sensitive information (kdump core files).
0
Attacker Value
Unknown

local privilege escalation in SUSE postgresql init script

Disclosure Date: March 01, 2018 (last updated November 08, 2023)
A race condition in the postgresql init script could be used by attackers able to access the postgresql account to escalate their privileges to root.
0