Suse

Webyast

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Published 23.12.2013 23:55:04
  • Last modified 11.04.2025 00:51:21

WebYaST 1.3 uses weak permissions for config/initializers/secret_token.rb, which allows local users to gain privileges by reading the Rails secret token from this file.

  • EPSS 93.55%
  • Published 23.11.2013 18:55:04
  • Last modified 11.04.2025 00:51:21

nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.

  • EPSS 0.69%
  • Published 26.01.2013 21:55:00
  • Last modified 11.04.2025 00:51:21

SUSE WebYaST before 1.2 0.2.63-0.6.1 allows remote attackers to modify the hosts list, and subsequently conduct man-in-the-middle attacks, via a crafted /host request on TCP port 4984.

  • EPSS 2.81%
  • Published 08.12.2011 20:55:01
  • Last modified 11.04.2025 00:51:21

Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.