Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 3.1.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-52751
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-free in smb2_query_info_compound() The following UAF was triggered when running fstests generic/072 with KASAN enabled against Windows Server 2022 and mount options 'multichannel...
7.5
CVSSv3
CVE-2021-45100
The ksmbd server up to and including 3.4.2, as used in the Linux kernel up to and including 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, whic...
Ksmbd Project Ksmbd
Netapp H410c Firmware -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H300e Firmware -
Netapp H500e Firmware -
Netapp H700e Firmware -
Netapp H410s Firmware -
6.5
CVSSv3
CVE-2018-12207
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
Intel Core I3-10110u Firmware -
Intel Core I3-10110y Firmware -
Intel Core I3-1005g1 Firmware -
Intel Core I3-9300t Firmware -
Intel Core I3-9300 Firmware -
Intel Core I3-9100 Firmware -
Intel Core I3-9100t Firmware -
Intel Core I3-9350k Firmware -
Intel Core I3-9320 Firmware -
Intel Core I3-8145u Firmware -
Intel Core I3-8300 Firmware -
Intel Core I3-8100t Firmware -
Intel Core I3-8300t Firmware -
Intel Core I3-8109u Firmware -
Intel Core I3-8130u Firmware -
Intel Core I3-8100 Firmware -
Intel Core I3-8350k Firmware -
Intel Core I3-7100 Firmware -
Intel Core I3-7350k Firmware -
Intel Core I3-7300t Firmware -
Intel Core I3-7167u Firmware -
Intel Core I3-7300 Firmware -
3 Github repositories
2 Articles
7.5
CVSSv3
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixe...
Linux Linux Kernel
F5 Big-ip Advanced Firewall Manager
F5 Big-ip Access Policy Manager
F5 Big-ip Application Acceleration Manager
F5 Big-ip Link Controller
F5 Big-ip Policy Enforcement Manager
F5 Big-ip Webaccelerator
F5 Big-ip Application Security Manager
F5 Big-ip Local Traffic Manager
F5 Big-ip Fraud Protection Service
F5 Big-ip Global Traffic Manager
F5 Big-ip Analytics
F5 Big-ip Edge Gateway
F5 Big-ip Domain Name System
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux 7.0
F5 Enterprise Manager 3.1.1
F5 Traffix Signaling Delivery Controller
4 Github repositories
1 Article
5.5
CVSSv3
CVE-2011-5321
The tty_open function in drivers/tty/tty_io.c in the Linux kernel prior to 3.1.1 mishandles a driver-lookup failure, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted access to a...
Linux Linux Kernel
NA
CVE-2014-8989
The Linux kernel up to and including 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that...
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.1
Linux Linux Kernel 3.0.10
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.12
Linux Linux Kernel 3.0.13
Linux Linux Kernel 3.0.2
Linux Linux Kernel 3.0.20
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.43
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.50
Linux Linux Kernel 3.0.58
Linux Linux Kernel 3.0.59
Linux Linux Kernel 3.0.65
Linux Linux Kernel 3.0.66
Linux Linux Kernel 3.1
1 Github repository
NA
CVE-2014-9090
The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel up to and including 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system ca...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.15.8
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.15.1
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.12
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.14
Linux Linux Kernel 3.13.1
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.13.10
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.10.24
Linux Linux Kernel 3.13.11
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.15.3
NA
CVE-2012-6647
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel prior to 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified ot...
Linux Linux Kernel 3.4.75
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.55
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.53
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.4.78
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.4.71
NA
CVE-2014-2889
Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel prior to 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.58
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.52
Linux Linux Kernel 3.0.51
NA
CVE-2013-7281
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel prior to 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.12
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »