Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
mwr infosecurity vulnerabilities and exploits
(subscribe to this query)
8.3
CVSSv2
CVE-2011-2497
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel prior to 3.0 allows remote malicious users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within th...
Linux Linux Kernel
4.9
CVSSv2
CVE-2011-2928
The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel prior to 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malfor...
Linux Linux Kernel 3.1
Linux Linux Kernel
4.6
CVSSv2
CVE-2011-1020
The proc filesystem implementation in the Linux kernel 2.6.37 and previous versions does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denia...
Linux Linux Kernel
1 EDB exploit
1.9
CVSSv2
CVE-2011-2492
The bluetooth subsystem in the Linux kernel prior to 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockop...
Linux Linux Kernel 3.0
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
4.9
CVSSv2
CVE-2011-2484
The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and previous versions does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a cr...
Linux Linux Kernel
6.4
CVSSv2
CVE-2011-3188
The (1) IPv4 and (2) IPv6 implementations in the Linux kernel prior to 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote malicious users to cause a denial of service (disrupted networking) or hijack ...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
F5 Enterprise Manager 3.0.0
F5 Firepass 7.0.0
F5 Big-ip Local Traffic Manager
F5 Big-ip Access Policy Manager
F5 Big-ip Edge Gateway
F5 Big-ip Global Traffic Manager
F5 Big-ip Link Controller
F5 Big-ip Webaccelerator
F5 Big-ip Wan Optimization Manager
F5 Big-ip Protocol Security Module
F5 Big-ip Application Security Manager
F5 Firepass
F5 Arx
F5 Enterprise Manager
F5 Big-ip Analytics
8.3
CVSSv2
CVE-2011-3191
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel prior to 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read reque...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
5.4
CVSSv2
CVE-2011-1768
The tunnels implementation in the Linux kernel prior to 2.6.34, when tunnel functionality is configured as a module, allows remote malicious users to cause a denial of service (OOPS) by sending a packet during module loading.
Linux Linux Kernel 2.6.33.7
Linux Linux Kernel 2.6.33.9
Linux Linux Kernel 2.6.33.18
Linux Linux Kernel 2.6.33.14
Linux Linux Kernel 2.6.33.19
Linux Linux Kernel 2.6.33.2
Linux Linux Kernel 2.6.33.6
Linux Linux Kernel 2.6.33.17
Linux Linux Kernel 2.6.33.1
Linux Linux Kernel 2.6.33.4
Linux Linux Kernel 2.6.33
Linux Linux Kernel 2.6.33.12
Linux Linux Kernel 2.6.33.3
Linux Linux Kernel 2.6.33.13
Linux Linux Kernel 2.6.33.11
Linux Linux Kernel 2.6.33.15
Linux Linux Kernel 2.6.33.16
Linux Linux Kernel
Linux Linux Kernel 2.6.33.8
Linux Linux Kernel 2.6.33.5
Linux Linux Kernel 2.6.33.10
5
CVSSv2
CVE-2014-5300
Adaptive Computing Moab prior to 7.2.9 and 8 prior to 8.0.0 allows remote malicious users to bypass the signature check, impersonate arbitrary users, and execute commands via a message without a signature.
Adaptivecomputing Moab
Adaptivecomputing Moab 8.0
1 EDB exploit
7.2
CVSSv2
CVE-2014-4113
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a craft...
Microsoft Windows 7 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2012 R2
Microsoft Windows Rt 8.1 -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Rt -
4 EDB exploits
13 Github repositories
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2