Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 6.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0293
aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory.
Suse Suse Linux 6.1
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 6.0
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2001-1130
Sdbsearch.cgi in SuSE Linux 6.0-7.2 could allow remote malicious users to execute arbitrary commands by uploading a keylist.txt file that contains filenames with shell metacharacters, then causing the file to be searched using a .. in the HTTP referer (from the HTTP_REFERER varia...
Suse Suse Linux 6.0
Suse Suse Linux 7.2
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.3
Suse Suse Linux 6.4
1 EDB exploit
NA
CVE-2000-1107
in.identd ident server in SuSE Linux 6.x and 7.0 allows remote malicious users to cause a denial of service via a long request, which causes the server to access a NULL pointer and crash.
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
NA
CVE-2001-0193
Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter.
Debian Debian Linux 2.2
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
1 EDB exploit
NA
CVE-2000-0231
Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges.
Suse Suse Linux 6.3
Halloween Halloween Linux 4.0
Suse Suse Linux 6.1
Suse Suse Linux 6.0
Suse Suse Linux 6.2
1 EDB exploit
NA
CVE-2000-0869
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote malicious users to list arbitrary directories via the PROPFIND HTTP request method.
Apache Http Server 1.3.12
Suse Suse Linux 6.4
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 7.0
Suse Suse Linux 6.3
Suse Suse Linux 6.2
1 EDB exploit
NA
CVE-2000-0868
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote malicious users to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.
Apache Http Server 1.3.12
Suse Suse Linux 6.4
Suse Suse Linux 6.3
NA
CVE-2001-0763
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and previous versions may allow remote malicious users to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Debian Debian Linux
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 7.1
Suse Suse Linux 7.2
1 EDB exploit
NA
CVE-2001-0834
htsearch CGI program in htdig (ht://Dig) 3.1.5 and previous versions allows remote malicious users to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero,...
Conectiva Linux 6.0
Conectiva Linux 7.0
Conectiva Linux 5.0
Conectiva Linux 5.1
Htdig Htdig
Suse Suse Linux 7.2
Suse Suse Linux 7.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Debian Debian Linux 2.2
Suse Suse Linux 6.3
NA
CVE-2001-0641
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
Immunix Immunix 6.2
Immunix Immunix 7.0
Immunix Immunix 7.0 Beta
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Linux 5.2
Suse Suse Linux 6.4
Suse Suse Linux 7.0
Redhat Linux 6.2
Redhat Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »