Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 3.11 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-1444
The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel prior to 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWAN...
Linux Linux Kernel 3.11.1
Linux Linux Kernel 3.11
Linux Linux Kernel
Linux Linux Kernel 3.11.4
Linux Linux Kernel 3.11.3
Linux Linux Kernel 3.11.2
Linux Linux Kernel 3.11.5
NA
CVE-2014-1445
The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel prior to 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
Linux Linux Kernel 3.11.1
Linux Linux Kernel 3.11
Linux Linux Kernel
Linux Linux Kernel 3.11.4
Linux Linux Kernel 3.11.3
Linux Linux Kernel 3.11.2
Linux Linux Kernel 3.11.5
NA
CVE-2013-2890
drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate malicious users to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2013-2891
drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate malicious users to cause a denial of service (heap-based out-of-bounds write) via a crafte...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2013-2898
drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate malicious users to obtain sensitive information from kernel memory via a crafted device.
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2013-2894
drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate malicious users to cause a denial of service (heap-based out-of-bounds write) via a craf...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2013-2899
drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate malicious users to cause a denial of service (NULL pointer dereference and OOPS) via a crafte...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2013-2897
Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel up to and including 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate malicious users to cause a denial of service (heap memory corr...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
NA
CVE-2014-8989
The Linux kernel up to and including 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that...
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.1
Linux Linux Kernel 3.0.10
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.12
Linux Linux Kernel 3.0.13
Linux Linux Kernel 3.0.2
Linux Linux Kernel 3.0.20
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.43
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.50
Linux Linux Kernel 3.0.58
Linux Linux Kernel 3.0.59
Linux Linux Kernel 3.0.65
Linux Linux Kernel 3.0.66
Linux Linux Kernel 3.1
1 Github repository
NA
CVE-2014-9090
The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel up to and including 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system ca...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.15.8
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.15.1
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.12
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.14
Linux Linux Kernel 3.13.1
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.13.10
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.10.24
Linux Linux Kernel 3.13.11
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.15.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27975
CVE-2024-2961
CVE-2024-20380
XML injection
HTML injection
CVE-2024-29204
CVE-2023-51795
memory leak
CVE-2024-3470
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »