By Risk Score
By Publish Date
By Recent Activity
secure linux vulnerabilities and exploits
(subscribe to this query)
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd....
1 Github repository available
In all Android releases from CAF using the Linux kernel, some validation of secure applications was not being performed....
In all Android releases from CAF using the Linux kernel, stack protection was not enabled for secure applications....
An issue was discovered in Pulse Secure Pulse Connect Secure (PCS) through 2020-04-06. The applet in tncc.jar, executed on macOS, Linux, and Solaris clients when a Host Checker policy is enforced, accepts an arbitrary SSL certificate....
In all Qualcomm products with Android releases from CAF using the Linux kernel, the Secure File System can become corrupted....
In all Android releases from CAF using the Linux kernel, HLOS can overwite secure memory or read contents of the keystore....
In the Secure File System in all Android releases from CAF using the Linux kernel, a capture-replay vulnerability could potentially exist....
Unknown vulnerability in F-Secure Anti-Virus (FSAV) 4.52 for Linux before Hotfix 3 allows the Sober.D worm to bypass FASV....
In all Qualcomm products with Android releases from CAF using the Linux kernel, there is a TOCTOU race condition in Secure UI....
suid.cgi scripts in F-Secure (1) Internet Gatekeeper for Linux before 2.15.484 and (2) Anti-Virus Linux Gateway before 2.16 are installed SUID with world-executable permissions, which allows local users to gain privilege....
1 EDB exploit available