Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ubuntu ubuntu linux 5.10 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2006-5649
Unspecified vulnerability in the "alignment check exception handling" in Ubuntu 5.10, 6.06 LTS, and 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (kernel panic) via unspecified vectors.
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.10
7.2
CVSSv2
CVE-2006-3378
passwd command in shadow in Ubuntu 5.04 up to and including 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 5.04
7.2
CVSSv2
CVE-2006-1183
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.
Ubuntu Ubuntu Linux 5.10
1 EDB exploit
2.1
CVSSv2
CVE-2006-5173
Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000),...
Linux Linux Kernel
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
5
CVSSv2
CVE-2006-5779
OpenLDAP prior to 2.3.29 allows remote malicious users to cause a denial of service (daemon crash) via LDAP BIND requests with long authcid names, which triggers an assertion failure.
Openldap Openldap
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
6.8
CVSSv2
CVE-2007-1562
The FTP protocol implementation in Mozilla Firefox prior to 1.5.0.11 and 2.x prior to 2.0.0.3 allows remote malicious users to force the client to connect to other servers, perform a proxied port scan, or obtain sensitive information by specifying an alternate server address in a...
Mozilla Firefox
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.10
1 EDB exploit
4.3
CVSSv2
CVE-2006-6811
KsIRC 1.3.12 allows remote malicious users to cause a denial of service (crash) via a long PRIVMSG string when connecting to an Internet Relay Chat (IRC) server, which causes an assertion failure and results in a NULL pointer dereference. NOTE: this issue was originally reported ...
Kde Ksirc 1.3.12
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
1 EDB exploit
7.5
CVSSv2
CVE-2005-4807
Stack-based buffer overflow in the as_bad function in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils prior to 20050721 allows malicious users to execute arbitrary code via a .c file with crafted inline assembly code.
Gnu Binutils
Canonical Ubuntu Linux 5.04
Canonical Ubuntu Linux 5.10
1 EDB exploit
6.8
CVSSv2
CVE-2007-0780
browser.js in Mozilla Firefox 1.5.x prior to 1.5.0.10 and 2.x prior to 2.0.0.2, and SeaMonkey prior to 1.0.8 uses the requesting URI to identify child windows, which allows remote malicious users to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating...
Mozilla Firefox
Mozilla Seamonkey
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
9.3
CVSSv2
CVE-2006-6504
Mozilla Firefox 2.x prior to 2.0.0.1, 1.5.x prior to 1.5.0.9, and SeaMonkey prior to 1.0.7 allows remote malicious users to execute arbitrary code by appending an SVG comment DOM node to another type of document, which triggers memory corruption.
Mozilla Firefox
Mozilla Seamonkey
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »