Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
local users vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2015-1350
The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system...
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux 7.0
NA
CVE-1999-0064
Buffer overflow in AIX lquerylv program gives root access to local users.
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 4.1.1
Ibm Aix 4.1.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 3.2
1 EDB exploit
NA
CVE-1999-0409
Buffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access.
Suse Suse Linux 3.5
Suse Suse Linux 5.2
1 EDB exploit
NA
CVE-2001-0085
Buffer overflow in Kermit communications software in HP-UX 11.0 and previous versions allows local users to cause a denial of service and possibly execute arbitrary commands.
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Hp Hp-ux 10.20
Hp Hp-ux 11.00
7
CVSSv3
CVE-2015-8963
Race condition in kernel/events/core.c in the Linux kernel prior to 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
Linux Linux Kernel
7.8
CVSSv3
CVE-2019-15283
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an malicious user to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain e...
Cisco Webex Meetings
Cisco Webex Meetings Online
Cisco Webex Meetings Online 32.11
Cisco Webex Meetings Online 39.4.0
Cisco Webex Meetings Online T32.9
Cisco Webex Meetings Online T39.3
Cisco Webex Meetings Online T39.6.0
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
7.8
CVSSv3
CVE-2019-15285
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an malicious user to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain e...
Cisco Webex Meetings
Cisco Webex Meetings Online
Cisco Webex Meetings Online 32.11
Cisco Webex Meetings Online 39.4.0
Cisco Webex Meetings Online T32.9
Cisco Webex Meetings Online T39.3
Cisco Webex Meetings Online T39.6.0
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
7.8
CVSSv3
CVE-2019-15287
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an malicious user to execute arbitrary code on an affected system. The vulnerabilities exist due to insufficient validation of certain e...
Cisco Webex Meetings
Cisco Webex Meetings Online
Cisco Webex Meetings Online 32.11
Cisco Webex Meetings Online 39.4.0
Cisco Webex Meetings Online T32.9
Cisco Webex Meetings Online T39.3
Cisco Webex Meetings Online T39.6.0
Cisco Webex Meetings Server 3.0
Cisco Webex Meetings Server 4.0
NA
CVE-2006-5557
Stack-based buffer overflow in the (1) swpackage and (2) swmodify commands in HP-UX B.11.11 and possibly other versions allows local users to execute arbitrary code via a long -S argument. NOTE: this might be a duplicate of CVE-2006-2574, but the details relating to CVE-2006-2574...
Hp Hp-ux 11.00
Hp Hp-ux 11.11
Hp Hp-ux 11.4
2 EDB exploits
NA
CVE-2000-0362
Buffer overflows in Linux cdwtools 093 and previous versions allows local users to gain root privileges.
Suse Suse Linux 6.1
Suse Suse Linux 6.2
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »