Page 14 of 76 results (0.007 seconds)

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash). • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20620 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11647 https://access.redhat.com/security/cve/CVE-2005-0092 https://bugzilla.redhat.com/show_bug.cgi?id=1617454 •

CVSS: 5.0EPSS: 17%CPEs: 14EXPL: 0

The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0208. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=11 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/523888 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata&# •

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837 http://marc.info/?l=bugtraq&m=110763358832637&w=2 http://secunia.com/advisories/14137 http://www.redhat.com/support/errata/RHSA-2005-152.html http://www.securityfocus.com/bid/12445 https://exchange.xforce.ibmcloud.com/vulnerabilities/19218 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11339 https://access.redhat.com/security/cve/CVE-2005-0337 https://bugzilla.redhat.com/show_bug.cgi? •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file. • http://marc.info/?l=bugtraq&m=110667936707597&w=2 http://secunia.com/advisories/14015 http://secunia.com/advisories/14050 http://securitytracker.com/id?1013007 http://www.debian.org/security/2005/dsa-658 http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:030 http://www.redhat.com/support/errata/RHSA-2005-072.html http://www.securityfocus.com/archive/1/426530/30/6600/threaded http://www.securityfocus •

CVSS: 6.9EPSS: 0%CPEs: 53EXPL: 0

Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://isec.pl/vulnerabilities/isec-0022-pagefault.txt http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html http://marc.info/?l=bugtraq&m=110554694522719&w=2 http://marc.info/?l=bugtraq&m=110581146702951&w=2 http://secunia.com/advisories/13822 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://securitytracker.com/id •