Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.32 vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2011-1748
The raw_release function in net/can/raw.c in the Linux kernel prior to 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release o...
Linux Linux Kernel 2.6.39
Linux Linux Kernel
4.9
CVSSv2
CVE-2013-3223
The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel prior to 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
Linux Linux Kernel
Linux Linux Kernel 3.9
4.9
CVSSv2
CVE-2013-3228
The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel prior to 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
Linux Linux Kernel
Linux Linux Kernel 3.9
4.9
CVSSv2
CVE-2013-3229
The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel prior to 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
Linux Linux Kernel
Linux Linux Kernel 3.9
4.9
CVSSv2
CVE-2013-3234
The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel prior to 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
Linux Linux Kernel
Linux Linux Kernel 3.9
4.6
CVSSv2
CVE-2011-1020
The proc filesystem implementation in the Linux kernel 2.6.37 and previous versions does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denia...
Linux Linux Kernel
1 EDB exploit
4.9
CVSSv2
CVE-2011-2928
The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel prior to 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malfor...
Linux Linux Kernel 3.1
Linux Linux Kernel
2.1
CVSSv2
CVE-2010-3875
The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel prior to 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
Linux Linux Kernel 2.6.37
Linux Linux Kernel
Debian Debian Linux 5.0
4.9
CVSSv2
CVE-2012-1601
The KVM implementation in the Linux kernel prior to 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
Linux Linux Kernel
7.2
CVSSv2
CVE-2012-2123
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel prior to 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions ...
Linux Linux Kernel
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »