Show filters
769 Total Results
Displaying 41-50 of 769
Sort by:
Attacker Value
Unknown
squid: /usr/sbin/pinger packaged with wrong permission
Disclosure Date: October 07, 2019 (last updated November 27, 2024)
The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterprise Server 15 before and including version 4.8-5.8.1 and in SUSE Linux Enterprise Server 12 before and including 3.5.21-26.17.1 had squid:root, 0750 permissions. This allowed an attacker that compromissed the squid user to gain persistence by changing the binary
0
Attacker Value
Unknown
CVE-2018-19655
Disclosure Date: November 29, 2018 (last updated November 08, 2023)
A stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.
0
Attacker Value
Unknown
CVE-2018-12116
Disclosure Date: November 28, 2018 (last updated November 27, 2024)
Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request, then data can be provided which will trigger a second, unexpected, and user-defined HTTP request to made to the same server.
0
Attacker Value
Unknown
CVE-2018-19208
Disclosure Date: November 12, 2018 (last updated November 27, 2024)
In libwpd 0.10.2, there is a NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp that will lead to a denial of service attack. This is related to WPXTable.h.
0
Attacker Value
Unknown
CVE-2018-19052
Disclosure Date: November 07, 2018 (last updated November 27, 2024)
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
0
Attacker Value
Unknown
The lxc-user-nic component of LXC allows unprivileged users to open arbitrary f…
Disclosure Date: August 10, 2018 (last updated November 27, 2024)
lxc-user-nic when asked to delete a network interface will unconditionally open a user provided path. This code path may be used by an unprivileged user to check for the existence of a path which they wouldn't otherwise be able to reach. It may also be used to trigger side effects by causing a (read-only) open of special kernel files (ptmx, proc, sys). Affected releases are LXC: 2.0 versions above and including 2.0.9; 3.0 versions above and including 3.0.0, prior to 3.0.2.
0
Attacker Value
Unknown
Missing verification of host key for kdump server
Disclosure Date: June 08, 2018 (last updated November 08, 2023)
The kdump implementation is missing the host key verification in the kdump and mkdumprd OpenSSH integration of kdump prior to version 2012-01-20. This is similar to CVE-2011-3588, but different in that the kdump implementation is specific to SUSE. A remote malicious kdump server could use this flaw to impersonate the correct kdump server to obtain security sensitive information (kdump core files).
0
Attacker Value
Unknown
unix2_chkpwd do not check for a valid account
Disclosure Date: June 08, 2018 (last updated November 08, 2023)
A vulnerability in pam_modules of SUSE Linux Enterprise allows attackers to log into accounts that should have been disabled. Affected releases are SUSE Linux Enterprise: versions prior to 12.
0
Attacker Value
Unknown
local privilege escalation in SUSE postgresql init script
Disclosure Date: March 01, 2018 (last updated November 08, 2023)
A race condition in the postgresql init script could be used by attackers able to access the postgresql account to escalate their privileges to root.
0
Attacker Value
Unknown
CVE-2016-5759
Disclosure Date: September 08, 2017 (last updated November 08, 2023)
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
0