Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.11 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2005-0531
The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 prior to 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.10
187
VMScore
CVE-2005-0532
The reiserfs_copy_from_user_to_file_region function in reiserfs/file.c for Linux kernel 2.6.10 and 2.6.11 prior to 2.6.11-rc4, when running on 64-bit architectures, may allow local users to trigger a buffer overflow as a result of casting discrepancies between size_t and int data...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.10
187
VMScore
CVE-2005-0529
Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
187
VMScore
CVE-2005-0530
Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
215
VMScore
CVE-2005-0916
AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with CONFIG_HUGETLB_PAGE enabled allows local users to cause a denial of service (system panic) via a process that executes the io_queue_init function but exits without running io_queue_release, which causes exit_a...
Linux Linux Kernel 2.6.11
1 EDB exploit
187
VMScore
CVE-2005-1764
Linux 2.6.11 on 64-bit x86 (x86_64) platforms does not use a guard page for the 47-bit address page to protect against an AMD K8 bug, which allows local users to cause a denial of service.
Linux Linux Kernel 2.6.11
445
VMScore
CVE-2005-2872
The ipt_recent kernel module (ipt_recent.c) in Linux kernel prior to 2.6.12, when running on 64-bit processors such as AMD64, allows remote malicious users to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.8.1
187
VMScore
CVE-2005-3044
Multiple vulnerabilities in Linux kernel prior to 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
445
VMScore
CVE-2005-2459
The huft_build function in inflate.c in the zlib routines in the Linux kernel prior to 2.6.12.5 returns the wrong value, which allows remote malicious users to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a diffe...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.7
409
VMScore
CVE-2005-2555
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Debian Debian Linux 3.1
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »