Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-4395
Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote malicious users to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs.
Ubuntu Linux Kernel
Linux Linux Kernel 2.6
NA
CVE-2011-1162
The tpm_read function in the Linux kernel 2.6 does not properly clear memory, which might allow local users to read the results of the previous TPM command.
Linux Linux Kernel 2.6
NA
CVE-2011-4110
The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key.&q...
Linux Linux Kernel 2.6
NA
CVE-2011-2203
The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
Linux Linux Kernel 2.6
NA
CVE-2011-4132
The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allows local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value."
Linux Linux Kernel 2.6
Suse Linux Enterprise Server 10
NA
CVE-2004-2135
cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.5.10
Linux Linux Kernel 2.5.11
Linux Linux Kernel 2.5.19
Linux Linux Kernel 2.5.2
Linux Linux Kernel 2.5.26
Linux Linux Kernel 2.5.27
Linux Linux Kernel 2.5.33
Linux Linux Kernel 2.5.34
Linux Linux Kernel 2.5.41
Linux Linux Kernel 2.5.42
Linux Linux Kernel 2.5.49
1 EDB exploit
NA
CVE-2008-3527
arch/i386/kernel/sysenter.c in the Virtual Dynamic Shared Objects (vDSO) implementation in the Linux kernel prior to 2.6.21 does not properly check boundaries, which allows local users to gain privileges or cause a denial of service via unspecified vectors, related to the install...
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.6.20.16
Linux Linux Kernel 2.6.19.4
Linux Linux Kernel 2.4.36.1
Linux Linux Kernel 2.6.20.17
Linux Linux Kernel 2.4.36.4
Linux Linux Kernel 2.6.20.20
Linux Linux Kernel 2.4.36.3
Linux Linux Kernel 2.6.20.18
Linux Linux Kernel 2.6.19.7
Linux Linux Kernel 2.6.20.19
Linux Linux Kernel
Linux Linux Kernel 2.4.36
Linux Linux Kernel 2.6.19.6
Linux Linux Kernel 2.6.19.5
Linux Linux Kernel 2.4.36.5
Linux Linux Kernel 2.2.27
Linux Linux Kernel 2.6
NA
CVE-2009-4131
The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel prior to 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.32
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
1 EDB exploit
NA
CVE-2007-3642
The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel prior to 2.6.20.15, 2.6.21.x prior to 2.6.21.6, and prior to 2.6.22 allows remote malicious users to cause a denial of service (crash) via an encoded, out-of-range index value for a choice fi...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.19
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
NA
CVE-2009-3043
The tty_ldisc_hangup function in drivers/char/tty_ldisc.c in the Linux kernel 2.6.31-rc prior to 2.6.31-rc8 allows local users to cause a denial of service (system crash, sometimes preceded by a NULL pointer dereference) or possibly gain privileges via certain pseudo-terminal I/O...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.11.10
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
deserialization
CVE-2024-4040
cross-site scripting
CVE-2023-25790
CVE-2024-2961
XML external entity
CVE-2024-26926
CVE-2024-32806
CVE-2024-32711
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »