Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arch linux vulnerabilities and exploits
(subscribe to this query)
756
VMScore
CVE-2020-5291
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root pe...
Projectatomic Bubblewrap
Debian Debian Linux 10.0
Archlinux Arch Linux -
Centos Centos 7.0
436
VMScore
CVE-2008-6107
The (1) sys32_mremap function in arch/sparc64/kernel/sys_sparc32.c, the (2) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c, and the (3) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel prior to 2.6.25.4, omit some virtual-address ran...
Linux Linux Kernel 2.6.16.12
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.15.4
Linux Linux Kernel 2.6.15.1
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.4.36.3
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.6.16.45
Linux Linux Kernel 2.6.16.33
Linux Linux Kernel 2.6.16.32
Linux Linux Kernel 2.6.16.41
Linux Linux Kernel 2.6.16.40
436
VMScore
CVE-2017-8106
The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 up to and including 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
Linux Linux Kernel 3.12
Linux Linux Kernel 3.12.5
Linux Linux Kernel 3.12.7
Linux Linux Kernel 3.12.14
Linux Linux Kernel 3.12.16
Linux Linux Kernel 3.12.23
Linux Linux Kernel 3.12.25
Linux Linux Kernel 3.12.27
Linux Linux Kernel 3.12.29
Linux Linux Kernel 3.12.36
Linux Linux Kernel 3.12.38
Linux Linux Kernel 3.12.45
Linux Linux Kernel 3.12.47
Linux Linux Kernel 3.12.52
Linux Linux Kernel 3.12.54
Linux Linux Kernel 3.12.9
Linux Linux Kernel 3.12.10
Linux Linux Kernel 3.12.11
Linux Linux Kernel 3.12.12
Linux Linux Kernel 3.14.67
Linux Linux Kernel 3.14.68
Linux Linux Kernel 3.15
NA
CVE-2024-27983
An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the se...
1 Github repository
1 Article
NA
CVE-2024-27982
The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling malicio...
NA
CVE-2024-3094
Malicious code exists in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific fun...
Tukaani Xz 5.6.1
Tukaani Xz 5.6.0
82 Github repositories
6 Articles
419
VMScore
CVE-2013-4512
Buffer overflow in the exitcode_proc_write function in arch/um/kernel/exitcode.c in the Linux kernel prior to 3.12 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging root privileges for a write operation.
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.4.1
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
437
VMScore
CVE-2013-4220
The bad_mode function in arch/arm64/kernel/traps.c in the Linux kernel prior to 3.9.5 on the ARM64 platform allows local users to cause a denial of service (system crash) via vectors involving an attempted register access that triggers an unexpected value in the Exception Syndrom...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.9.3
Linux Linux Kernel 3.9.1
Linux Linux Kernel
Linux Linux Kernel 3.9.2
410
VMScore
CVE-2014-2889
Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel prior to 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.0.63
Linux Linux Kernel 3.0.46
Linux Linux Kernel 3.0.47
Linux Linux Kernel 3.0.48
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.58
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.52
Linux Linux Kernel 3.0.51
188
VMScore
CVE-2011-2208
Integer signedness error in the osf_getdomainname function in arch/alpha/kernel/osf_sys.c in the Linux kernel prior to 2.6.39.4 on the Alpha platform allows local users to obtain sensitive information from kernel memory via a crafted call.
Linux Linux Kernel 2.6.39
Linux Linux Kernel 2.6.39.1
Linux Linux Kernel
Linux Linux Kernel 2.6.39.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »