Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 3.3 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2017-16664
Code injection exists in Kernel/System/Spelling.pm in Open Ticket Request System (OTRS) 5 prior to 5.0.24, 4 prior to 4.0.26, and 3.3 prior to 3.3.20. In the agent interface, an authenticated remote attacker can execute shell commands as the webserver user via URL manipulation.
Otrs Otrs
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
8.8
CVSSv3
CVE-2017-0781
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
Google Android 7.1.0
Google Android 7.1.2
Google Android 5.1.0
Google Android 4.2
Google Android 4.1
Google Android 5.0.2
Google Android 6.0.1
Google Android 6.0
Google Android 4.0.2
Google Android 4.4.3
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 4.4.4
Google Android 7.0
Google Android 4.2.1
Google Android 5.0.1
Google Android 5.0
Google Android 4.0.3
Google Android 4.0
Google Android 4.4
Google Android 4.4.1
1 EDB exploit
20 Github repositories
8.8
CVSSv3
CVE-2017-0782
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146237.
Google Android 7.1.0
Google Android 7.1.2
Google Android 5.1.0
Google Android 4.2
Google Android 4.1
Google Android 5.0.2
Google Android 6.0.1
Google Android 6.0
Google Android 4.0.2
Google Android 4.4.3
Google Android 4.0.4
Google Android 4.3
Google Android 4.0.1
Google Android 4.4.4
Google Android 7.0
Google Android 4.2.1
Google Android 5.0.1
Google Android 5.0
Google Android 4.0.3
Google Android 4.0
Google Android 4.4
Google Android 4.4.1
4 Github repositories
7.5
CVSSv3
CVE-2023-32820
In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Mediatek Iot Yocto 23.0
Google Android 11.0
Google Android 12.0
Google Android 13.0
Linux Linux Kernel 4.19
7.5
CVSSv3
CVE-2014-0242
mod_wsgi module prior to 3.4 for Apache, when used in embedded mode, might allow remote malicious users to obtain sensitive information via the Content-Type header which is generated from memory that may have been freed and then overwritten by a separate thread.
Modwsgi Mod Wsgi
1 EDB exploit
7.5
CVSSv3
CVE-2017-14315
In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly v...
Apple Iphone Os 8.1.3
Apple Iphone Os 8.1.2
Apple Iphone Os 9.3.2
Apple Iphone Os 8.0
Apple Iphone Os 9.3
Apple Iphone Os 9.3.1
Apple Iphone Os 7.0.4
Apple Iphone Os 8.0.1
Apple Iphone Os 7.1.1
Apple Iphone Os 9.3.4
Apple Iphone Os 8.0.2
Apple Iphone Os 7.0.5
Apple Iphone Os 7.1
Apple Iphone Os 9.2.1
Apple Iphone Os 7.0.6
Apple Iphone Os 7.0.1
Apple Iphone Os 8.1
Apple Iphone Os 9.0
Apple Iphone Os 9.0.1
Apple Iphone Os 9.3.3
Apple Iphone Os 7.0.2
Apple Iphone Os 9.3.5
6.8
CVSSv3
CVE-2017-8628
Microsoft Bluetooth Driver in Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703 allows a spoofing vulnerability due to Microsoft's implementation of the Bluetooth stack, aka "Microsoft Bluetooth Driver Spoofing Vulner...
Microsoft Windows Rt 8.1
Microsoft Windows 10 1511
Microsoft Windows 10 1607
Microsoft Windows 8.1
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows 10 1703
Microsoft Windows 10 -
2 Github repositories
6.7
CVSSv3
CVE-2023-20661
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
6.7
CVSSv3
CVE-2023-20659
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588413.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
6.7
CVSSv3
CVE-2023-20662
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560765; Issue ID: ALPS07560765.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »