Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.8 vulnerabilities and exploits
(subscribe to this query)
365
VMScore
CVE-2006-5871
smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x prior to 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.6.8
445
VMScore
CVE-2005-2548
vlan_dev.c in the VLAN code for Linux kernel 2.6.8 allows remote malicious users to cause a denial of service (kernel oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument, as demonstrated using snmpwalk on snmpd.
Linux Linux Kernel 2.6.8
187
VMScore
CVE-2005-0136
The Linux kernel prior to 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.10
632
VMScore
CVE-2005-0449
The netfilter/iptables module in Linux prior to 2.6.8.1 allows remote malicious users to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
187
VMScore
CVE-2005-0204
Linux kernel prior to 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8.1
641
VMScore
CVE-2005-1264
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6 Test9 Cvs
641
VMScore
CVE-2005-0839
Linux kernel 2.6 prior to 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.6
641
VMScore
CVE-2004-0887
SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.7
Suse Suse Linux 9.0
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
436
VMScore
CVE-2004-2660
Memory leak in direct-io.c in Linux kernel 2.6.x prior to 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests.
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.8.1
107
VMScore
CVE-2004-1069
Race condition in SELinux 2.6.x up to and including 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6 Test9 Cvs
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »