Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux desktop vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2005-0092
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when running on x86 with the hugemem kernel, allows local users to cause a denial of service (crash).
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
7.2
CVSSv2
CVE-2007-4130
The Linux kernel 2.6.9 prior to 2.6.9-67 in Red Hat Enterprise Linux (RHEL) 4 on Itanium (ia64) does not properly handle page faults during NUMA memory access, which allows local users to cause a denial of service (panic) via invalid arguments to set_mempolicy in an MPOL_BIND ope...
Redhat Enterprise Linux Desktop 4
Redhat Enterprise Linux 4.0
7.5
CVSSv2
CVE-2004-0750
Unknown vulnerability in redhat-config-nfs prior to 1.0.13, when shares are exported to multiple hosts, can produce incorrect permissions and prevent the all_squash option from being applied.
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
7.2
CVSSv2
CVE-2005-0403
init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors ...
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
4.3
CVSSv2
CVE-2006-7226
Perl-Compatible Regular Expression (PCRE) library prior to 6.7 does not properly calculate the compiled memory allocation for regular expressions that involve a quantified "subpattern containing a named recursion or subroutine reference," which allows context-dependent ...
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux 4.0
4.6
CVSSv2
CVE-2005-3631
udev does not properly set permissions on certain files in /dev/input, which allows local users to obtain sensitive data that is entered at the console, such as user passwords.
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux 4.0
2.1
CVSSv2
CVE-2005-2100
The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows local users to cause a denial of service (crash).
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
2.1
CVSSv2
CVE-2005-0757
The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled.
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
4.6
CVSSv2
CVE-2007-0773
The Linux kernel prior to 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.
Redhat Enterprise Linux 4.4
Redhat Enterprise Linux Desktop 4.4
7.5
CVSSv2
CVE-2005-0086
Heap-based buffer overflow in less in Red Hat Enterprise Linux 3 allows malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted file, as demonstrated using the UTF-8 locale.
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »