Page 984 of 5206 results (0.009 seconds)

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://lkml.org/lkml/2005/12/23/171 http://secunia.com/advisories/18788 http://secunia.com/advisories/19038 http://secunia.com/advisories/21465 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.novell.com/linux/security/advisories/2006_06_kernel.html http://www.redhat.com/support/errata/RHSA-2006-0575.html http://www.securityfocus.com/bid&#x • CWE-862: Missing Authorization •

CVSS: 5.0EPSS: 2%CPEs: 175EXPL: 0

The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages. • http://secunia.com/advisories/18216 http://secunia.com/advisories/18788 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea86575eaf99a9262a969309d934318028dbfacb http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 http://www.novell.com/linux/security/advisories/2006_06_kernel.html http://www.securityfocus.com/bid/16139 http://www.vupen.com/english/advisories/2006/0035 •

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 2

The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041177.html http://www.redteam-pentesting.de/advisories/rt-sa-2005-015.txt http://www.redteam-pentesting.de/advisories/rt-sa-2005-15.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/24037 •

CVSS: 2.1EPSS: 0%CPEs: 80EXPL: 2

The securelevels implementation in NetBSD 2.1 and earlier, and Linux 2.6.15 and earlier, allows local users to bypass time setting restrictions and set the clock backwards by setting the clock ahead to the maximum unixtime value (19 Jan 2038), which then wraps around to the minimum value (13 Dec 1901), which can then be set ahead to the desired time, aka "settimeofday() time wrap." • http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041178.html http://secunia.com/advisories/25691 http://securitytracker.com/id?1015454 http://www.redteam-pentesting.de/advisories/rt-sa-2005-16.txt http://www.securityfocus.com/archive/1/421426/100/0/threaded http://www.securityfocus.com/archive/1/471457 http://www.securityfocus.com/bid/16170 https://exchange.xforce.ibmcloud.com/vulnerabilities/24036 •

CVSS: 2.1EPSS: 0%CPEs: 32EXPL: 0

The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761. • http://lists.alioth.debian.org/pipermail/kernel-svn-changes/2005-August/002597.html http://openvz.org/news/updates/kernel-022stab045.1-released http://secunia.com/advisories/17002 http://www.gelato.unsw.edu.au/archives/linux-ia64/0409/11073.html http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11 http://www.redhat.com/support/errata/RHSA-2005-420.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.vupen.com/english/advisories/2005/1878 htt •