Page 13 of 76 results (0.008 seconds)

CVSS: 5.6EPSS: 0%CPEs: 121EXPL: 0

Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt http://marc.info/?l=freebsd-hackers&m=110994026421858&w=2 http://marc.info/?l=freebsd-security&m=110994370429609&w=2 http://marc.info/?l=openbsd-misc&m=110995101417256&w=2 http://secunia.com/advisories/15348 http://secunia.com/advisories/18165 http://securitytracker.com/id?1013967 http://sunsolve.sun.com/search/document.do? •

CVSS: 7.5EPSS: 1%CPEs: 82EXPL: 0

scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.5/SCOSA-2006.5.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.57/SCOSA-2005.57.txt ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U http://bugs.gentoo.org/show_bug.cgi?id=83598 http://bugs.gentoo.org/show_bug.cgi?id=83655 http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://secunia.c •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an "access check," which allows local users to cause a denial of service (crash). • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20618 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10425 https://access.redhat.com/security/cve/CVE-2005-0090 https://bugzilla.redhat.com/show_bug.cgi?id=1617452 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls. • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20619 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11249 https://access.redhat.com/security/cve/CVE-2005-0091 https://bugzilla.redhat.com/show_bug.cgi?id=1617453 •

CVSS: 5.0EPSS: 12%CPEs: 14EXPL: 0

Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=10 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.debian.org/security/2005/dsa-716 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/839280 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_ •