Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dan rosenberg vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2011-0709
The br_mdb_ip_get function in net/bridge/br_multicast.c in the Linux kernel prior to 2.6.35-rc5 allows remote malicious users to cause a denial of service (NULL pointer dereference and system crash) via an IGMP packet, related to lack of a multicast table.
Linux Linux Kernel 2.6.35
Linux Linux Kernel
7.1
CVSSv3
CVE-2010-2537
The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the Linux kernel prior to 2.6.35 allows local users to overwrite an append-only file via a (1) BTRFS_IOC_CLONE or (2) BTRFS_IOC_CLONE_RANGE ioctl call that specifies this file as a donor.
Linux Linux Kernel
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Suse Suse Linux Enterprise Server 11
Suse Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
6.8
CVSSv3
CVE-2009-4067
Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel prior to 2.6.27 allows physically proximate malicious users to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
Linux Linux Kernel
Redhat Enterprise Linux 4.0
1 EDB exploit
6.5
CVSSv3
CVE-2011-3363
The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel prior to 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
Linux Linux Kernel
Redhat Enterprise Linux 4.0
6.1
CVSSv3
CVE-2011-1776
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel prior to 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate malicious users to cause a denial of service (heap-based buff...
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server Aus 5.6
Redhat Enterprise Linux Server Eus 5.6
5.9
CVSSv3
CVE-2012-5821
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle malicious users to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
Lynx Lynx -
Canonical Ubuntu Linux 11.10
Canonical Ubuntu Linux 12.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
5.5
CVSSv3
CVE-2011-2918
The Performance Events subsystem in the Linux kernel prior to 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application.
Linux Linux Kernel
1 EDB exploit
5.5
CVSSv3
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel prior to 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
Suse Linux Enterprise Server 11
5.5
CVSSv3
CVE-2011-3637
The m_stop function in fs/proc/task_mmu.c in the Linux kernel prior to 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Linux Linux Kernel
Redhat Enterprise Linux 6.0
5.5
CVSSv3
CVE-2010-4655
net/core/ethtool.c in the Linux kernel prior to 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
Linux Linux Kernel
Vmware Esx 4.1
Vmware Esx 4.0
Canonical Ubuntu Linux 8.04
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »