Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.16.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1524
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally w...
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16.5
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.16.1
Linux Linux Kernel 2.6.16.2
NA
CVE-2006-1864
Directory traversal vulnerability in smbfs in Linux 2.6.16 and previous versions allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.16.1
Linux Linux Kernel 2.6.16.2
Linux Linux Kernel 2.6.16.7
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16 Rc7
1 EDB exploit
NA
CVE-2006-2934
SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 prior to 2.6.17.3 and 2.6.16 prior to 2.6.16.23 allows remote malicious users to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value ...
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.15
Linux Linux Kernel 2.6.16.1
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.16.11
Linux Linux Kernel 2.6.16.14
Linux Linux Kernel 2.6.16.21
Linux Linux Kernel 2.6.17.1
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.16.22
Linux Linux Kernel 2.6.16.10
Linux Linux Kernel 2.6.16.17
Linux Linux Kernel 2.6.16.12
Linux Linux Kernel 2.6.16.2
Linux Linux Kernel 2.6.16.19
Linux Linux Kernel 2.6.16.20
NA
CVE-2006-2629
Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that l...
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.15.1
Linux Linux Kernel 2.6.16.10
Linux Linux Kernel 2.6.16.11
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.16.2
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.15.4
Linux Linux Kernel 2.6.15.5
Linux Linux Kernel 2.6.16.14
Linux Linux Kernel 2.6.16.15
Linux Linux Kernel 2.6.16.5
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.15.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.16.12
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.15.6
1 EDB exploit
NA
CVE-2006-3626
Race condition in Linux kernel 2.6.17.4 and previous versions allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.17.4
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.17.3
Linux Linux Kernel 2.6.16.15
Linux Linux Kernel 2.6.16.1
Linux Linux Kernel 2.6.16.11
Linux Linux Kernel 2.6.16.14
Linux Linux Kernel 2.6.16.21
Linux Linux Kernel 2.6.16.23
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.17.1
Linux Linux Kernel 2.6.16.22
Linux Linux Kernel 2.6.16.10
NA
CVE-2006-2451
The suid_dumpable support in Linux kernel 2.6.13 up to versions prior to 2.6.17.4, and 2.6.16 prior to 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program ...
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.17.3
Linux Linux Kernel 2.6.16.15
Linux Linux Kernel 2.6.15.6
Linux Linux Kernel 2.6.15.1
5 EDB exploits
NA
CVE-2006-1857
Buffer overflow in SCTP in Linux kernel prior to 2.6.16.17 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.14.2
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.16.12
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.15.1
NA
CVE-2006-1858
SCTP in Linux kernel prior to 2.6.16.17 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.15.4
Linux Linux Kernel 2.6.15.5
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.16.10
NA
CVE-2006-0744
Linux kernel prior to 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.15.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.11.2
NA
CVE-2006-2445
Race condition in run_posix_cpu_timers in Linux kernel prior to 2.6.16.21 allows local users to cause a denial of service (BUG_ON crash) by causing one CPU to attach a timer to a process that is exiting.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.16.18
Linux Linux Kernel 2.6.14.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »