CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
15h00 +00:00 |
emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file. | 7.2 |
||
20h00 +00:00 |
The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories. | 2.1 |
||
00h00 +00:00 |
Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory. | 7.2 |
||
08h00 +00:00 |
Buffer overflow in the French documentation patch for Gnuplot 3.7 in SuSE Linux before 8.0 allows local users to execute arbitrary code as root via unknown attack vectors. | 7.2 |
||
20h00 +00:00 |
The installation script for orarun on SUSE Linux before 20070810 places the oracle user into the disk group, which allows the local oracle user to read or write raw disk partitions. | 4.6 |
||
15h00 +00:00 |
The default configuration of Centre for Speech Technology Research (CSTR) Festival 1.95 beta (aka 2.0 beta) on Gentoo Linux, SUSE Linux, and possibly other distributions, is run locally with elevated privileges without requiring authentication, which allows local and remote attackers to execute arbitrary commands via the local daemon on port 1314, a different vulnerability than CVE-2001-0956. NOTE: this issue is local in some environments, but remote on others. | 10 |
||
00h00 +00:00 |
Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations." | 10 |
||
02h00 +00:00 |
StoreBackup before 1.19 allows local users to perform unauthorized operations on arbitrary files via a symlink attack on temporary files. | 2.1 |
||
02h00 +00:00 |
StoreBackup before 1.19 creates the backup root with world-readable permissions, which allows local users to obtain sensitive information. | 2.1 |
||
02h00 +00:00 |
StoreBackup before 1.19 does not properly set the uid and guid for symbolic links (1) that are backed up by storeBackup.pl, or (2) recovered by storeBackupRecover.pl, which could cause files to be restored with incorrect ownership. | 4.6 |
||
02h00 +00:00 |
exif.c in PHP before 4.3.11 allows remote attackers to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion. | 5 |
||
04h00 +00:00 |
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. | 7.5 |
||
04h00 +00:00 |
xloadimage before 4.1-r2, and xli before 1.17, allows attackers to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command. | 7.5 |
||
04h00 +00:00 |
Multiple vulnerabilities in xli before 1.17 may allow remote attackers to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files. | 7.5 |
||
04h00 +00:00 |
Opera 7.54 and earlier uses kfmclient exec to handle unknown MIME types, which allows remote attackers to execute arbitrary code via a shortcut or launcher that contains an Exec entry. | 5 |
||
04h00 +00:00 |
The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. | 7.5 |
||
04h00 +00:00 |
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters. | 4.6 |
||
04h00 +00:00 |
Race condition in SuSE Linux 8.1 through 9.2, when run on SMP systems that have more than 4GB of memory, could allow local users to read unauthorized memory from "foreign memory pages." | 1.2 |
||
03h00 +00:00 |
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function. | 7.5 |
||
04h00 +00:00 |
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option. | 4.6 |
||
02h00 +00:00 |
time server daemon timed allows remote attackers to cause a denial of service via malformed packets. | 10 |
||
02h00 +00:00 |
rctab in SuSE 7.0 and earlier allows local users to create or overwrite arbitrary files via a symlink attack on the rctmp temporary file. | 1.2 |
||
02h00 +00:00 |
kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges. | 2.1 |
||
04h00 +00:00 |
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. | 10 |
||
04h00 +00:00 |
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary directories via the PROPFIND HTTP request method. | 5 |
||
04h00 +00:00 |
in.identd ident server in SuSE Linux 6.x and 7.0 allows remote attackers to cause a denial of service via a long request, which causes the server to access a NULL pointer and crash. | 5 |
||
02h00 +00:00 |
String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges. | 10 |
||
02h00 +00:00 |
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information. | 2.1 |
||
02h00 +00:00 |
Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges. | 7.2 |
||
02h00 +00:00 |
Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory. | 6.2 |
||
02h00 +00:00 |
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter. | 7.2 |
||
02h00 +00:00 |
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles. | 4.6 |
||
02h00 +00:00 |
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. | 7.2 |
||
02h00 +00:00 |
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges. | 7.2 |
||
02h00 +00:00 |
aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory. | 2.1 |
||
02h00 +00:00 |
Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname. | 7.2 |
||
04h00 +00:00 |
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service. | 5 |
||
04h00 +00:00 |
Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable. | 7.5 |
||
04h00 +00:00 |
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths. | 5 |
||
02h00 +00:00 |
A buffer overflow in lsof allows local users to obtain root privilege. | 7.2 |
||
02h00 +00:00 |
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. | 4.6 |