Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.28.7 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-0787
The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 prior to 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions...
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.28.8
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.28.7
Linux Linux Kernel 2.6.28.1
Linux Linux Kernel 2.6.28
NA
CVE-2011-4348
Race condition in the sctp_rcv function in net/sctp/input.c in the Linux kernel prior to 2.6.29 allows remote malicious users to cause a denial of service (system hang) via SCTP packets. NOTE: in some environments, this issue exists because of an incomplete fix for CVE-2011-2482.
Linux Linux Kernel
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.28.8
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.28.9
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.28.7
Linux Linux Kernel 2.6.28.1
Linux Linux Kernel 2.6.28
NA
CVE-2011-4324
The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel prior to 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
Linux Linux Kernel
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.28.8
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.28.9
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.28.7
Linux Linux Kernel 2.6.28.1
Linux Linux Kernel 2.6.28
NA
CVE-2009-1298
The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions prior to 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote malicious users to cause a denial of service (NULL pointer dereference and han...
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.29
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.32
Linux Linux Kernel 2.6.31.3
Linux Linux Kernel 2.6.30
Linux Linux Kernel 2.6.31.4
Linux Linux Kernel 2.6.31.6
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.31.1
Linux Linux Kernel 2.6.30.7
Linux Linux Kernel 2.6.29.4
Linux Linux Kernel 2.6.30.8
Linux Linux Kernel 2.6.30.9
Linux Linux Kernel 2.6.28.8
Linux Linux Kernel 2.6.29.1
Linux Linux Kernel 2.6.30.4
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel
NA
CVE-2009-0835
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and previous versions on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process ma...
Linux Linux Kernel 2.6.25
Linux Linux Kernel 2.6.25.10
Linux Linux Kernel 2.6.25.3
Linux Linux Kernel 2.6.25.4
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.25.6
Linux Linux Kernel 2.6.25.12
Linux Linux Kernel 2.6.25.11
Linux Linux Kernel 2.6.25.9
Linux Linux Kernel 2.6.25.1
Linux Linux Kernel 2.6.25.2
Linux Linux Kernel 2.6.25.7
Linux Linux Kernel 2.6.25.8
1 EDB exploit
NA
CVE-2009-1265
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions prior to 2.6.30-rc1, might allow remote malicious users to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.52
Linux Linux Kernel 2.6.27.50
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.27.45
Linux Linux Kernel 2.6.27.34
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.26.5
Linux Linux Kernel 2.6.25.20
Linux Linux Kernel 2.6.27.37
Linux Linux Kernel 2.6.27.21
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.27.27
Linux Linux Kernel 2.6.25.18
Linux Linux Kernel 2.6.29
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.26.6
NA
CVE-2009-0746
The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
Linux Linux Kernel 2.6.27.11
1 EDB exploit
NA
CVE-2009-0747
The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and err...
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
NA
CVE-2009-0748
The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mo...
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
NA
CVE-2010-1088
fs/namei.c in Linux kernel 2.6.18 up to and including 2.6.34 does not always follow NFS automount "symlinks," which allows malicious users to have an unknown impact, related to LOOKUP_FOLLOW.
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.32.5
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.31.9
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.31.3
Linux Linux Kernel 2.6.20.13
Linux Linux Kernel 2.6.22.4
Linux Linux Kernel 2.6.27.45
Linux Linux Kernel 2.6.27.34
Linux Linux Kernel 2.6.27.18
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3400
CVE-2023-7252
CVE-2024-21111
denial of service
CVE-2024-29661
CVE-2024-22856
remote attackers
encryption
CVE-2023-38299
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »