Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 5.0 vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-1999-0746
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote malicious user to conduct a denial of service.
Suse Suse Linux 6.2
Slackware Slackware Linux 3.2
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Suse Suse Linux 5.3
1 EDB exploit
570
VMScore
CVE-2001-0834
htsearch CGI program in htdig (ht://Dig) 3.1.5 and previous versions allows remote malicious users to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero,...
Htdig Htdig
Conectiva Linux 6.0
Conectiva Linux 5.1
Conectiva Linux 7.0
Conectiva Linux 5.0
Debian Debian Linux 2.2
Suse Suse Linux 7.2
Suse Suse Linux 7.0
Suse Suse Linux 7.1
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.3
641
VMScore
CVE-1999-0390
Buffer overflow in Dosemu Slang library in Linux.
Redhat Linux 5.1
Redhat Linux 5.2
Redhat Linux 5.0
Suse Suse Linux 5.0
Redhat Linux 4.1
Suse Suse Linux 5.1
Redhat Linux 4.0
Redhat Linux 4.2
505
VMScore
CVE-2004-1491
Opera 7.54 and previous versions uses kfmclient exec to handle unknown MIME types, which allows remote malicious users to execute arbitrary code via a shortcut or launcher that contains an Exec entry.
Opera Opera Browser
Suse Suse Linux 6.2
Suse Suse Linux 4.0
Suse Suse Linux 9.2
Suse Suse Linux 9.0
Suse Suse Linux 7.1
Suse Suse Linux 8.2
Suse Suse Linux 6.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
Suse Suse Linux 5.2
Suse Suse Linux 3.0
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 1.0
Suse Suse Linux 9.1
Suse Suse Linux 7.0
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 5.1
1 EDB exploit
668
VMScore
CVE-2005-0638
xloadimage prior to 4.1-r2, and xli prior to 1.17, allows malicious users to execute arbitrary commands via shell metacharacters in filenames for compressed images, which are not properly quoted when calling the gunzip command.
Xli Xli 1.17
Xli Xli 1.16
Xli Xli 1.14
Xli Xli 1.15
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 9.3
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Altlinux Alt Linux 2.3
Suse Suse Linux 7.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
Suse Suse Linux 7.0
Suse Suse Linux 5.2
Suse Suse Linux 3.0
668
VMScore
CVE-2005-0639
Multiple vulnerabilities in xli prior to 1.17 may allow remote malicious users to execute arbitrary code via "buffer management errors" from certain image properties, some of which may be related to integer overflows in PPM files.
Xli Xli 1.17
Xli Xli 1.16
Xli Xli 1.14
Xli Xli 1.15
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 9.3
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Altlinux Alt Linux 2.3
Suse Suse Linux 7.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
Suse Suse Linux 7.0
Suse Suse Linux 5.2
Suse Suse Linux 3.0
735
VMScore
CVE-2000-0438
Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
Suse Suse Linux 6.2
Slackware Slackware Linux 3.5
Slackware Slackware Linux 3.4
Caldera Openlinux 7.0
Slackware Slackware Linux 3.9
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Turbolinux Turbolinux 6.0.1
Turbolinux Turbolinux 6.0
Turbolinux Turbolinux 6.0.2
Suse Suse Linux 6.1
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Suse Suse Linux 7.0
Slackware Slackware Linux 3.6
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Slackware Slackware Linux 3.3
3 EDB exploits
409
VMScore
CVE-2004-1184
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
Gnu Enscript 1.6.3
Sgi Propack 3.0
Gnu Enscript 1.4
Gnu Enscript 1.6.4
Gnu Enscript 1.6.2
Gnu Enscript 1.5
Gnu Enscript 1.6.1
Gnu Enscript 1.6
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Redhat Fedora Core Core 2.0
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
Suse Suse Linux 8.2
Suse Suse Linux 7.3
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 7.2
Suse Suse Linux 8.0
445
VMScore
CVE-2005-1043
exif.c in PHP prior to 4.3.11 allows remote malicious users to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Php Php 4.3.9
Conectiva Linux 9.0
Sgi Propack 3.0
Php Php 4.3.4
Php Php 4.3.0
Php Php 4.3.6
Php Php 4.3.7
Php Php 4.3.2
Php Php 4.3.3
Php Php 4.3.1
Php Php 4.3.10
Conectiva Linux 10.0
Php Php 4.3.8
Php Php 4.3.5
Suse Suse Linux 6.2
Suse Suse Linux 6.3
Suse Suse Linux 9.3
Suse Suse Linux 4.0
Suse Suse Linux 7.1
Suse Suse Linux 9.2
Suse Suse Linux 9.1
Suse Suse Linux 9.0
730
VMScore
CVE-1999-0405
A buffer overflow in lsof allows local users to obtain root privilege.
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Redhat Linux 5.2
Debian Debian Linux 2.0.5
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.0.5
Suse Suse Linux 5.0
Suse Suse Linux 4.4.1
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Freebsd Freebsd 2.2.8
Suse Suse Linux 6.1
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 2.2.4
Suse Suse Linux 4.3
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.2.6
Suse Suse Linux 4.4
Suse Suse Linux 5.1
Freebsd Freebsd 2.1.6
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38627
CVE-2022-45803
CVE-2024-38319
camera
template injection
CVE-2024-27801
CVE-2024-0762
CVE-2024-5791
unauthorized
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »