Filtered by vendor Suse
Subscriptions
Filtered by product Suse Linux
Subscriptions
Total
217 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2000-0218 | 2 Caldera, Suse | 2 Openlinux, Suse Linux | 2025-04-03 | N/A |
| Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname. | ||||
| CVE-2000-0340 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable. | ||||
| CVE-2000-0361 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information. | ||||
| CVE-2000-0362 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges. | ||||
| CVE-2000-0363 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory. | ||||
| CVE-2000-0433 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles. | ||||
| CVE-2000-0438 | 4 Caldera, Slackware, Suse and 1 more | 4 Openlinux, Slackware Linux, Suse Linux and 1 more | 2025-04-03 | N/A |
| Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter. | ||||
| CVE-2000-0614 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| Tnef program in Linux systems allows remote attackers to overwrite arbitrary files via TNEF encoded compressed attachments which specify absolute path names for the decompressed output. | ||||
| CVE-2000-1107 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| in.identd ident server in SuSE Linux 6.x and 7.0 allows remote attackers to cause a denial of service via a long request, which causes the server to access a NULL pointer and crash. | ||||
| CVE-2001-0109 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| rctab in SuSE 7.0 and earlier allows local users to create or overwrite arbitrary files via a symlink attack on the rctmp temporary file. | ||||
| CVE-2001-0172 | 2 Hans Reiser, Suse | 2 Reiserfs, Suse Linux | 2025-04-03 | N/A |
| Buffer overflow in ReiserFS 3.5.28 in SuSE Linux allows local users to cause a denial of service and possibly execute arbitrary commands by via a long directory name. | ||||
| CVE-2001-0388 | 3 Freebsd, Mandrakesoft, Suse | 3 Freebsd, Mandrake Linux, Suse Linux | 2025-04-03 | N/A |
| time server daemon timed allows remote attackers to cause a denial of service via malformed packets. | ||||
| CVE-2001-0525 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| Buffer overflow in dsh in dqs 3.2.7 in SuSE Linux 7.0 and earlier, and possibly other operating systems, allows local users to gain privileges via a long first command line argument. | ||||
| CVE-2001-0641 | 3 Immunix, Redhat, Suse | 3 Immunix, Linux, Suse Linux | 2025-04-03 | N/A |
| Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. | ||||
| CVE-2001-0914 | 2 Linux, Suse | 2 Linux Kernel, Suse Linux | 2025-04-03 | N/A |
| Linux kernel before 2.4.11pre3 in multiple Linux distributions allows local users to cause a denial of service (crash) by starting the core vmlinux kernel, possibly related to poor error checking during ELF loading. | ||||
| CVE-2001-0918 | 1 Suse | 1 Suse Linux | 2025-04-03 | N/A |
| Vulnerabilities in CGI scripts in susehelp in SuSE 7.2 and 7.3 allow remote attackers to execute arbitrary commands by not opening files securely. | ||||
| CVE-2017-3224 | 3 Quagga, Redhat, Suse | 4 Quagga, Package Manager, Opensuse and 1 more | 2024-11-21 | N/A |
| Open Shortest Path First (OSPF) protocol implementations may improperly determine Link State Advertisement (LSA) recency for LSAs with MaxSequenceNumber. According to RFC 2328 section 13.1, for two instances of the same LSA, recency is determined by first comparing sequence numbers, then checksums, and finally MaxAge. In a case where the sequence numbers are the same, the LSA with the larger checksum is considered more recent, and will not be flushed from the Link State Database (LSDB). Since the RFC does not explicitly state that the values of links carried by a LSA must be the same when prematurely aging a self-originating LSA with MaxSequenceNumber, it is possible in vulnerable OSPF implementations for an attacker to craft a LSA with MaxSequenceNumber and invalid links that will result in a larger checksum and thus a 'newer' LSA that will not be flushed from the LSDB. Propagation of the crafted LSA can result in the erasure or alteration of the routing tables of routers within the routing domain, creating a denial of service condition or the re-routing of traffic on the network. CVE-2017-3224 has been reserved for Quagga and downstream implementations (SUSE, openSUSE, and Red Hat packages). | ||||