Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
suse suse linux 4.0 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-1999-0390
Buffer overflow in Dosemu Slang library in Linux.
Redhat Linux 4.0
Suse Suse Linux 5.0
Suse Suse Linux 5.1
Redhat Linux 4.2
Redhat Linux 5.1
Redhat Linux 4.1
Redhat Linux 5.0
Redhat Linux 5.2
725
VMScore
CVE-2010-3081
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel prior to 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveragin...
Linux Linux Kernel 2.6.36
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
1 EDB exploit
1 Github repository
445
VMScore
CVE-2005-1043
exif.c in PHP prior to 4.3.11 allows remote malicious users to cause a denial of service (memory consumption and crash) via an EXIF header with a large IFD nesting level, which causes significant stack recursion.
Php Php 4.3.1
Php Php 4.3.10
Php Php 4.3.2
Php Php 4.3.9
Sgi Propack 3.0
Php Php 4.3.0
Php Php 4.3.7
Php Php 4.3.8
Php Php 4.3.5
Php Php 4.3.6
Php Php 4.3.3
Php Php 4.3.4
Conectiva Linux 10.0
Conectiva Linux 9.0
Apple Mac Os X Server 10.3.9
Apple Mac Os X Server 10.4
Suse Suse Linux 4.2
Suse Suse Linux 4.3
Suse Suse Linux 4.4
Suse Suse Linux 6.1
Suse Suse Linux 6.4
Apple Mac Os X 10.4
465
VMScore
CVE-1999-0433
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Xfree86 Project X11r6 3.3.3
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Redhat Linux 5.2
Slackware Slackware Linux 3.4
Netbsd Netbsd 1.3.3
Slackware Slackware Linux 4.0
Suse Suse Linux 5.2
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 5.1
Slackware Slackware Linux 3.6
Slackware Slackware Linux 3.3
Netbsd Netbsd 1.3.2
1 EDB exploit
668
VMScore
CVE-2005-0605
scan.c for LibXPM may allow malicious users to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow.
X.org X11r6 6.8
X.org X11r6 6.8.1
Xfree86 Project X11r6 3.3
Xfree86 Project X11r6 4.0.1
Xfree86 Project X11r6 4.0.2.11
Xfree86 Project X11r6 4.2.1
Xfree86 Project X11r6 4.3.0
Sgi Propack 3.0
X.org X11r6 6.7.0
Xfree86 Project X11r6 3.3.6
Xfree86 Project X11r6 4.0
Xfree86 Project X11r6 4.2.0
Lesstif Lesstif 0.93.94
Xfree86 Project X11r6 3.3.4
Xfree86 Project X11r6 3.3.5
Xfree86 Project X11r6 4.1.11
Xfree86 Project X11r6 4.1.12
Xfree86 Project X11r6 3.3.2
Xfree86 Project X11r6 3.3.3
Xfree86 Project X11r6 4.0.3
Xfree86 Project X11r6 4.1.0
Xfree86 Project X11r6 4.3.0.1
445
VMScore
CVE-2014-9116
The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote malicious users to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt...
Suse Linux Enterprise Desktop 12
Suse Suse Linux Enterprise Server 12
Mutt Mutt 1.5.23
Debian Debian Linux 7.0
Mageia Mageia 4.0
436
VMScore
CVE-2008-3275
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel prior to 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow...
Linux Linux Kernel
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Suse Suse Linux Enterprise Desktop 10
Suse Suse Linux Enterprise Server 10
1000
VMScore
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.0
Conectiva Linux 4.0es
Debian Debian Linux 2.2
Debian Debian Linux 2.3
Redhat Linux 6.1
Suse Suse Linux 6.4
Redhat Linux 6.2
Suse Suse Linux 7.0
Redhat Linux 6.0
Suse Suse Linux 6.3
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
3 EDB exploits
642
VMScore
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel prior to 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GET...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
Redhat Enterprise Mrg 2.0
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
436
VMScore
CVE-2007-6716
fs/direct-io.c in the dio subsystem in the Linux kernel prior to 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
Linux Linux Kernel
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 6.06
Debian Debian Linux 4.0
Novell Linux Desktop 9
Opensuse Opensuse 10.3
Suse Suse Linux Enterprise Server 10
Suse Suse Linux Enterprise Desktop 10
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »