Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arch linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-36902
In the Linux kernel, the following vulnerability has been resolved: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() syzbot is able to trigger the following crash [1], caused by unsafe ip6_dst_idev() use. Indeed ip6_dst_idev() can return NULL, and must alwa...
Linux Linux Kernel
188
VMScore
CVE-2018-18710
An issue exists in the Linux kernel up to and including 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local malicious users to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is sim...
Linux Linux Kernel
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Debian Debian Linux 8.0
NA
CVE-2023-52435
In the Linux kernel, the following vulnerability has been resolved: net: prevent mss overflow in skb_segment() Once again syzbot is able to crash the kernel in skb_segment() [1] GSO_BY_FRAGS is a forbidden value, but unfortunately the following computation in skb_segment() can re...
Linux Linux Kernel 6.7
Linux Linux Kernel
188
VMScore
CVE-2018-15594
arch/x86/kernel/paravirt.c in the Linux kernel prior to 4.18.1 mishandles certain indirect calls, which makes it easier for malicious users to conduct Spectre-v2 attacks against paravirtual guests.
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Linux Linux Kernel
2 Github repositories
642
VMScore
CVE-2014-3534
arch/s390/kernel/ptrace.c in the Linux kernel prior to 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently ga...
Linux Linux Kernel
Debian Debian Linux 7.0
740
VMScore
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
4 EDB exploits
NA
CVE-2024-0340
A vulnerability was found in vhost_new_msg in drivers/vhost/vhost.c in the Linux kernel, which does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This issue can allow local pri...
Linux Linux Kernel
Linux Linux Kernel 6.4
436
VMScore
CVE-2008-5395
The parisc_show_stack function in arch/parisc/kernel/traps.c in the Linux kernel prior to 2.6.28-rc7 on PA-RISC allows local users to cause a denial of service (system crash) via vectors associated with an attempt to unwind a stack that contains userspace addresses.
Linux Linux Kernel
Linux Linux Kernel 2.2.27
Linux Linux Kernel 2.4.36
Linux Linux Kernel 2.4.36.1
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.4.36.3
Linux Linux Kernel 2.4.36.4
Linux Linux Kernel 2.4.36.5
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.6
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.19.4
Linux Linux Kernel 2.6.19.5
Linux Linux Kernel 2.6.19.6
Linux Linux Kernel 2.6.19.7
Linux Linux Kernel 2.6.20.16
Linux Linux Kernel 2.6.20.17
Linux Linux Kernel 2.6.20.18
Linux Linux Kernel 2.6.20.19
Linux Linux Kernel 2.6.20.20
Linux Linux Kernel 2.6.20.21
Linux Linux Kernel 2.6.21.5
516
VMScore
CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote malicious users to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
Linux Linux Kernel 2.4.15
Netbsd Netbsd 1.5.3
Microsoft Windows 2000 Terminal Services
Netbsd Netbsd 1.6
Linux Linux Kernel 2.4.11
Netbsd Netbsd 1.5
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Microsoft Windows 2000
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
3 EDB exploits
2 Github repositories
475
VMScore
CVE-2012-0045
The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel prior to 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstr...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.2.10
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.33
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.2.4
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »