Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
alan cox vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2000-0792
Gnome Lokkit firewall package prior to 0.41 does not properly restrict access to some ports, even if a user does not make any services available.
Alan Cox Gnome-lokkit 0.1
5
CVSSv2
CVE-2003-0541
gtkhtml prior to 1.1.10, as used in Evolution, allows remote malicious users to cause a denial of service (crash) via a malformed message that causes a null pointer dereference.
Gnome Gtkhtml
4.6
CVSSv2
CVE-2004-0108
The isag utility, which processes sysstat data, allows local users to overwrite arbitrary files via a symlink attack on temporary files, a different vulnerability than CAN-2004-0107.
Redhat Sysstat 4.0.7-3
Sysstat Sysstat 4.1.4
Sysstat Sysstat 4.1.5
Sysstat Sysstat 4.1.2
Sysstat Sysstat 4.1.3
Sysstat Sysstat 4.0.7
Sysstat Sysstat 4.1.1
Sysstat Sysstat 5.0.1
Sgi Propack 2.3
Sgi Propack 2.4
Sysstat Sysstat 4.1.6
Sysstat Sysstat 4.1.7
6.9
CVSSv2
CVE-2013-2171
The vm_map_lookup function in sys/vm/vm_map.c in the mmap implementation in the kernel in FreeBSD 9.0 up to and including 9.1-RELEASE-p4 does not properly determine whether a task should have write access to a memory location, which allows local users to bypass filesystem write p...
Freebsd Freebsd 9.0
Freebsd Freebsd 9.1
2 EDB exploits
2 Github repositories
1 Article
4.6
CVSSv2
CVE-2004-0003
Unknown vulnerability in Linux kernel prior to 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."
Linux Linux Kernel
7.2
CVSSv2
CVE-2004-0010
Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.13
4.6
CVSSv2
CVE-2004-0109
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.5.0
5
CVSSv2
CVE-2004-0177
The ext3 code in Linux 2.4.x prior to 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by re...
Linux Linux Kernel 2.4.0
2.1
CVSSv2
CVE-2004-0178
The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x prior to 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.
Linux Linux Kernel 2.4.0
7.1
CVSSv2
CVE-2007-6282
The IPsec implementation in Linux kernel prior to 2.6.25 allows remote routers to cause a denial of service (crash) via a fragmented ESP packet in which the first fragment does not contain the entire ESP header and IV.
Redhat Enterprise Linux Es 4
Redhat Enterprise Linux Ws 4
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux As 4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
administrator privileges
CVE-2024-1579
hardcoded
CVE-2023-20198
CVE-2024-33587
CVE-2024-33449
CVE-2024-4308
HTML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »