Filtered by vendor Suse
Subscriptions
Filtered by product Suse Linux
Subscriptions
Total
214 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-0768 | 2 Redhat, Suse | 2 Linux, Suse Linux | 2025-04-03 | N/A |
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable. | ||||
CVE-1999-0804 | 4 Debian, Linux, Redhat and 1 more | 4 Debian Linux, Linux Kernel, Linux and 1 more | 2025-04-03 | N/A |
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths. | ||||
CVE-1999-0831 | 4 Cobalt, Debian, Sun and 1 more | 6 Qube, Debian Linux, Cobalt Raq and 3 more | 2025-04-03 | N/A |
Denial of service in Linux syslogd via a large number of connections. | ||||
CVE-1999-0906 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable. | ||||
CVE-1999-1495 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
xtvscreen in SuSE Linux 6.0 allows local users to overwrite arbitrary files via a symlink attack on the pic000.pnm file. | ||||
CVE-2000-0218 | 2 Caldera, Suse | 2 Openlinux, Suse Linux | 2025-04-03 | N/A |
Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname. | ||||
CVE-2000-0229 | 4 Alessandro Rubini, Debian, Redhat and 1 more | 4 Gpm, Debian Linux, Linux and 1 more | 2025-04-03 | N/A |
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. | ||||
CVE-2000-0340 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable. | ||||
CVE-2000-0355 | 3 Bent Bagger, Redhat, Suse | 3 Pbpg, Linux, Suse Linux | 2025-04-03 | N/A |
pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files. | ||||
CVE-2000-0361 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information. | ||||
CVE-2000-0362 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges. | ||||
CVE-2000-0363 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory. | ||||
CVE-2000-0433 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles. | ||||
CVE-2017-3224 | 3 Quagga, Redhat, Suse | 4 Quagga, Package Manager, Opensuse and 1 more | 2024-11-21 | N/A |
Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages). |