Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.24 vulnerabilities and exploits
(subscribe to this query)
437
VMScore
CVE-2008-2372
The Linux kernel 2.6.24 and 2.6.25 prior to 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages...
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.25.3
Linux Linux Kernel 2.6.24
Linux Linux Kernel 2.6.25.8
Linux Linux Kernel 2.6.25.1
Linux Linux Kernel 2.6.25.4
Linux Linux Kernel 2.6.25
Linux Linux Kernel 2.6.25.2
Linux Linux Kernel 2.6.25.7
Linux Linux Kernel 2.6.25.6
220
VMScore
CVE-2008-0010
The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 up to and including 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
Linux Linux Kernel 2.6.22
Linux Linux Kernel 2.6.22.1
Linux Linux Kernel 2.6.23
Linux Linux Kernel 2.6.23.7
Linux Linux Kernel 2.6.23.9
Linux Linux Kernel 2.6.22.16
Linux Linux Kernel 2.6.22.3
Linux Linux Kernel 2.6.23.1
Linux Linux Kernel 2.6.23.14
Linux Linux Kernel 2.6.22.6
Linux Linux Kernel 2.6.22.7
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.23.5
Linux Linux Kernel 2.6.23.6
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.22.5
Linux Linux Kernel 2.6.23.2
Linux Linux Kernel 2.6.23.3
Linux Linux Kernel 2.6.24
2 EDB exploits
220
VMScore
CVE-2008-0009
The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 up to and including 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
Linux Linux Kernel 2.6.22
Linux Linux Kernel 2.6.22.7
Linux Linux Kernel 2.6.23.5
Linux Linux Kernel 2.6.23.6
Linux Linux Kernel 2.6.23.7
Linux Linux Kernel 2.6.22.1
Linux Linux Kernel 2.6.22.16
Linux Linux Kernel 2.6.23
Linux Linux Kernel 2.6.23.1
Linux Linux Kernel 2.6.23.9
Linux Linux Kernel 2.6.22.5
Linux Linux Kernel 2.6.22.6
Linux Linux Kernel 2.6.23.3
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.24
Linux Linux Kernel 2.6.22.3
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.23.14
Linux Linux Kernel 2.6.23.2
2 EDB exploits
410
VMScore
CVE-2009-1338
The kill_something_info function in kernel/signal.c in the Linux kernel prior to 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in...
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.25.4
Linux Linux Kernel 2.6.25.11
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.25.9
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.23.13
Linux Linux Kernel 2.6.24.2
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.6.26.5
Linux Linux Kernel 2.6.22.21
Linux Linux Kernel 2.6.25.12
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.23.8
Linux Linux Kernel 2.6.25
Linux Linux Kernel 2.6.22.12
Linux Linux Kernel 2.6.25.8
Linux Linux Kernel 2.6.27.10
436
VMScore
CVE-2009-2909
Integer signedness error in the ax25_setsockopt function in net/ax25/af_ax25.c in the ax25 subsystem in the Linux kernel prior to 2.6.31.2 allows local users to cause a denial of service (OOPS) via a crafted optlen value in an SO_BINDTODEVICE operation.
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
446
VMScore
CVE-2009-1265
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions prior to 2.6.30-rc1, might allow remote malicious users to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.52
Linux Linux Kernel 2.6.27.50
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.27.45
Linux Linux Kernel 2.6.27.34
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.26.5
Linux Linux Kernel 2.6.25.20
Linux Linux Kernel 2.6.27.37
Linux Linux Kernel 2.6.27.21
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.27.27
Linux Linux Kernel 2.6.25.18
Linux Linux Kernel 2.6.29
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.26.6
642
VMScore
CVE-2009-2695
The Linux kernel prior to 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.11.10
695
VMScore
CVE-2009-2846
The eisa_eeprom_read function in the parisc isa-eeprom component (drivers/parisc/eisa_eeprom.c) in the Linux kernel prior to 2.6.31-rc6 allows local users to access restricted memory via a negative ppos argument, which bypasses a check that assumes that ppos is positive and cause...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.27.30
418
VMScore
CVE-2009-2849
The md driver (drivers/md/md.c) in the Linux kernel prior to 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to "suspend_* sysfs attributes" and the (1) suspend_lo_store or (2) suspend_hi_store functions. NOTE...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.11.10
437
VMScore
CVE-2008-1514
arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions prior to 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in 31-bit mode, which triggers an invalid dereference...
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.26
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.16.43
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »