Page 28 of 150 results (0.032 seconds)

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash). • http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12599 https://exchange.xforce.ibmcloud.com/vulnerabilities/20620 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11647 https://access.redhat.com/security/cve/CVE-2005-0092 https://bugzilla.redhat.com/show_bug.cgi?id=1617454 •

CVSS: 5.0EPSS: 17%CPEs: 14EXPL: 0

The HTML parsing functions in Gaim before 1.1.3 allow remote attackers to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0208. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000933 http://gaim.sourceforge.net/security/index.php?id=11 http://marc.info/?l=bugtraq&m=110935655500670&w=2 http://secunia.com/advisories/14322 http://www.gentoo.org/security/en/glsa/glsa-200503-03.xml http://www.kb.cert.org/vuls/id/523888 http://www.mandriva.com/security/advisories?name=MDKSA-2005:049 http://www.novell.com/linux/security/advisories/2005_36_sudo.html http://www.redhat.com/support/errata&# •

CVSS: 7.5EPSS: 0%CPEs: 146EXPL: 0

The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. El parche para corregir las vulnerabilidades de desbordamiento de entero en Xpdf 2.0 y 3.0 (CAN-2004-0888) es incompleto para arquitecturas de 64 bits en ciertas distribuciones de Linux como Red Hat, lo que podría dejar a los usuarios de Xpdf expuestos a las vulnerabilidades originales. • http://www.mandriva.com/security/advisories?name=MDKSA-2005:041 http://www.mandriva.com/security/advisories?name=MDKSA-2005:042 http://www.mandriva.com/security/advisories?name=MDKSA-2005:043 http://www.mandriva.com/security/advisories?name=MDKSA-2005:044 http://www.mandriva.com/security/advisories? •

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

Postfix 2.1.3, when /proc/net/if_inet6 is not available and permit_mx_backup is enabled in smtpd_recipient_restrictions, allows remote attackers to bypass e-mail restrictions and perform mail relaying by sending mail to an IPv6 hostname. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=267837 http://marc.info/?l=bugtraq&m=110763358832637&w=2 http://secunia.com/advisories/14137 http://www.redhat.com/support/errata/RHSA-2005-152.html http://www.securityfocus.com/bid/12445 https://exchange.xforce.ibmcloud.com/vulnerabilities/19218 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11339 https://access.redhat.com/security/cve/CVE-2005-0337 https://bugzilla.redhat.com/show_bug.cgi? •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

The DBI library (libdbi-perl) for Perl allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file. • http://marc.info/?l=bugtraq&m=110667936707597&w=2 http://secunia.com/advisories/14015 http://secunia.com/advisories/14050 http://securitytracker.com/id?1013007 http://www.debian.org/security/2005/dsa-658 http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:030 http://www.redhat.com/support/errata/RHSA-2005-072.html http://www.securityfocus.com/archive/1/426530/30/6600/threaded http://www.securityfocus •