ID SECURITYVULNS:VULN:5337
Type securityvulns
Reporter SECUNIA
Modified 2005-10-13T00:00:00
Description
Memory leaks may potentially lead to DoS conditions.
{"id": "SECURITYVULNS:VULN:5337", "bulletinFamily": "software", "title": "Linux kernel memory leaks", "description": "Memory leaks may potentially lead to DoS conditions.", "published": "2005-10-13T00:00:00", "modified": "2005-10-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:5337", "reporter": "SECUNIA", "references": ["https://vulners.com/securityvulns/securityvulns:doc:9927"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:20", "edition": 1, "viewCount": 3, "enchantments": {"score": {"value": 3.8, "vector": "NONE", "modified": "2018-08-31T11:09:20", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["EULEROS_SA-2020-1498.NASL", "EULEROS_SA-2020-1457.NASL", "EULEROS_SA-2020-1496.NASL", "EULEROS_SA-2020-1477.NASL", "EULEROS_SA-2020-1491.NASL", "EULEROS_SA-2020-1494.NASL", "EULEROS_SA-2020-1483.NASL", "EULEROS_SA-2020-1489.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220201494", "OPENVAS:1361412562311220201489", "OPENVAS:1361412562311220201457", "OPENVAS:1361412562311220201446", "OPENVAS:1361412562311220201477", "OPENVAS:1361412562311220201400", "OPENVAS:1361412562311220201491", "OPENVAS:1361412562311220201476", "OPENVAS:1361412562311220201430", "OPENVAS:1361412562311220201473"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:9927"]}], "modified": "2018-08-31T11:09:20", "rev": 2}, "vulnersScore": 3.8}, "affectedSoftware": [{"name": "kernel", "operator": "eq", "version": "2.6"}]}
{"rst": [{"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **152[.]228.135.215** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-22T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **tor_exit**.\nASN 16276: (First IP 152.228.128.0, Last IP 152.228.255.255).\nASN Name \"OVH\" and Organisation \"\".\nThis IP is a part of \"**ovh**\" address pools.\nASN hosts 8825628 domains.\nGEO IP information: City \"\", Country \"France\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-22T00:00:00", "id": "RST:A28C2DDC-5337-344F-8F2F-6FF8D21394CF", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: 152.228.135.215", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **178[.]72.68.66** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **9**.\n First seen: 2020-11-21T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **generic**.\nASN 44257: (First IP 178.72.64.0, Last IP 178.72.79.255).\nASN Name \"TNGSSOUTH\" and Organisation \"\".\nASN hosts 61 domains.\nGEO IP information: City \"Tyumen\", Country \"Russia\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-11-21T00:00:00", "id": "RST:960E6DC4-5337-30B3-9626-E8AD3342C477", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: 178.72.68.66", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **http://42[.]230.5.168:60955/mozi.a** in [RST Threat Feed](https://rstcloud.net/profeed) with score **9**.\n First seen: 2021-01-17T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **malware**.\nIOC could be a **False Positive** (Resource unavailable).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-17T00:00:00", "id": "RST:612545A1-5337-3B99-AB6B-B5216199B9E6", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: http://42.230.5.168:60955/mozi.a", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-27T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **bankingonlines[.]tk** in [RST Threat Feed](https://rstcloud.net/profeed) with score **2**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-27T03:00:00.\n IOC tags: **spam**.\nDomain has DNS A records: 195[.]20.44.93\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:42CF6994-5337-338F-B0A1-9A0A3C946594", "href": "", "published": "2021-02-28T00:00:00", "title": "RST Threat feed. IOC: bankingonlines.tk", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-17T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **1ika[.]publicnode.ydns.eu** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-01-17T03:00:00, Last seen: 2021-01-17T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-17T00:00:00", "id": "RST:4D718C9C-5337-3600-BACD-97D9C5FF8C36", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: 1ika.publicnode.ydns.eu", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-17T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **api[.]a.dev.api.binance.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-01-17T03:00:00, Last seen: 2021-01-17T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-17T00:00:00", "id": "RST:925EACA5-5337-36E9-AFF6-EA835DF15C34", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: api.a.dev.api.binance.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 data-validity.coinpoolit.webhop.me** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 52[.]1.161.122\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:689782FB-5337-38A2-A92F-A157EC9A3861", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 data-validity.coinpoolit.webhop.me", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 kingmining.api.btc.top** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:66519643-5337-3093-B4A7-B1CAC90D0B22", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 kingmining.api.btc.top", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 phx-4.xmrpool.net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nWhois:\n Created: 2016-09-22 06:17:00, \n Registrar: Namecom Inc, \n Registrant: unknown.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:3F79811E-5337-32E9-B2C8-A40CB9BECFBB", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 phx-4.xmrpool.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-16T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **http://185[.]233.186.131/m68k** in [RST Threat Feed](https://rstcloud.net/profeed) with score **47**.\n First seen: 2021-01-27T03:00:00, Last seen: 2021-02-16T03:00:00.\n IOC tags: **malware**.\nIt was found that the IOC is used by: **bashlite**.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-27T00:00:00", "id": "RST:EC1353E7-5337-3A29-AFC6-B03BB8EC32B8", "href": "", "published": "2021-02-17T00:00:00", "title": "RST Threat feed. IOC: http://185.233.186.131/m68k", "type": "rst", "cvss": {}}]}