Page 26 of 140 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls. • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20619 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11249 https://access.redhat.com/security/cve/CVE-2005-0091 https://bugzilla.redhat.com/show_bug.cgi?id=1617453 •

CVSS: 5.0EPSS: 12%CPEs: 14EXPL: 0

Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=10 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.debian.org/security/2005/dsa-716 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/839280 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_ •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash). • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20620 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11647 https://access.redhat.com/security/cve/CVE-2005-0092 https://bugzilla.redhat.com/show_bug.cgi?id=1617454 •

CVSS: 5.0EPSS: 17%CPEs: 14EXPL: 0

The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0208. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=11 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/523888 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata&# •

CVSS: 7.5EPSS: 0%CPEs: 146EXPL: 0

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilidades originales. • http://www.mandriva.com/security/advisories?name=MDKSA-2005:041 http://www.mandriva.com/security/advisories?name=MDKSA-2005:042 http://www.mandriva.com/security/advisories?name=MDKSA-2005:043 http://www.mandriva.com/security/advisories?name=MDKSA-2005:044 http://www.mandriva.com/security/advisories? •