Suse Suse Linux 10.1 X86 64 Edition

CPE Details

Suse Suse Linux 10.1 X86 64 Edition
10.1
2023-12-29
17h02 +00:00
2023-12-29
17h02 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:suse:suse_linux:10.1:*:x86_64:*:*:*:*:*

Informations

Vendor

suse

Product

suse_linux

Version

10.1

edition

x86_64

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2008-3949 2008-09-22
15h00 +00:00
emacs/lisp/progmodes/python.el in Emacs 22.1 and 22.2 imports Python script from the current working directory during editing of a Python file, which allows local users to execute arbitrary code via a Trojan horse Python file.
7.2
CVE-2008-0883 2008-03-05
23h00 +00:00
acroread in Adobe Acrobat Reader 8.1.2 allows local users to overwrite arbitrary files via a symlink attack on temporary files related to SSL certificate handling.
3.7
CVE-2008-0411 2008-02-28
20h00 +00:00
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
6.8
CVE-2008-0732 2008-02-12
20h00 +00:00
The init script for Apache Geronimo on SUSE Linux follows symlinks when performing a chown operation, which might allow local users to obtain access to unspecified files or directories.
2.1
CVE-2007-6167 2007-11-29
00h00 +00:00
Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
7.2
CVE-2007-5197 2007-11-02
15h00 +00:00
Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods.
7.5
CVE-2007-4393 2007-08-17
20h00 +00:00
The installation script for orarun on SUSE Linux before 20070810 places the oracle user into the disk group, which allows the local oracle user to read or write raw disk partitions.
4.6
CVE-2007-4074 2007-07-30
15h00 +00:00
The default configuration of Centre for Speech Technology Research (CSTR) Festival 1.95 beta (aka 2.0 beta) on Gentoo Linux, SUSE Linux, and possibly other distributions, is run locally with elevated privileges without requiring authentication, which allows local and remote attackers to execute arbitrary commands via the local daemon on port 1314, a different vulnerability than CVE-2001-0956. NOTE: this issue is local in some environments, but remote on others.
10
CVE-2007-0460 2007-01-24
00h00 +00:00
Multiple buffer overflows in ulogd for SUSE Linux 9.3 up to 10.1, and possibly other distributions, have unknown impact and attack vectors related to "improper string length calculations."
10
CVE-2005-3146 2005-10-05
02h00 +00:00
StoreBackup before 1.19 allows local users to perform unauthorized operations on arbitrary files via a symlink attack on temporary files.
2.1
CVE-2005-3147 2005-10-05
02h00 +00:00
StoreBackup before 1.19 creates the backup root with world-readable permissions, which allows local users to obtain sensitive information.
2.1
CVE-2005-3148 2005-10-05
02h00 +00:00
StoreBackup before 1.19 does not properly set the uid and guid for symbolic links (1) that are backed up by storeBackup.pl, or (2) recovered by storeBackupRecover.pl, which could cause files to be restored with incorrect ownership.
4.6
CVE-2004-1191 2004-12-15
04h00 +00:00
Race condition in SuSE Linux 8.1 through 9.2, when run on SMP systems that have more than 4GB of memory, could allow local users to read unauthorized memory from "foreign memory pages."
1.2
CVE-2000-0361 2000-07-12
02h00 +00:00
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information.
2.1
CVE-2000-0218 2000-04-10
02h00 +00:00
Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname.
7.2