Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux desktop vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2005-0086
Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
2.1
CVSSv2
CVE-2005-2100
The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows local users to cause a denial of service (crash).
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
7.5
CVSSv2
CVE-2004-0750
Unknown vulnerability in redhat-config-nfs prior to 1.0.13, when shares are exported to multiple hosts, can produce incorrect permissions and prevent the all_squash option from being applied.
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
4.4
CVSSv2
CVE-2008-3825
pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and previous versions, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable t...
Redhat Enterprise Linux 5
Redhat Enterprise Linux Desktop 5
2.1
CVSSv2
CVE-2005-0092
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
2.1
CVSSv2
CVE-2005-0090
A regression error in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch omits an "access check," which allows local users to cause a denial of service (crash).
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
7.2
CVSSv2
CVE-2005-0091
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
7.2
CVSSv2
CVE-2005-0403
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors ...
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
7.2
CVSSv2
CVE-2007-4130
The Linux kernel 2.6.9 prior to 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND ope...
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux 4.0
4.3
CVSSv2
CVE-2006-7226
Perl-Compatible Regular Expression (PCRE) library prior to 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent ...
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux 4.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »