Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux audit project linux audit vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1753
A cron job in fcheck prior to 2.7.59 allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
Debian Debian Linux 3.1
NA
CVE-2006-1066
Linux kernel 2.6.16-rc2 and previous versions, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_deb...
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.1
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.13.4
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.15.4
Linux Linux Kernel 2.6.15
NA
CVE-2005-3044
Multiple vulnerabilities in Linux kernel prior to 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
NA
CVE-2005-3784
The auto-reap of child processes in Linux kernel 2.6 prior to 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.14.5
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.5
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.14.6
Linux Linux Kernel 2.6.12.1
NA
CVE-2006-0095
dm-crypt in Linux kernel 2.6.15 and previous versions does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.14.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.4
NA
CVE-2006-0482
Linux kernel 2.6.15.1 and previous versions, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.14.2
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.13.4
NA
CVE-2009-0745
The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 prior to 2.6.27.19 and 2.6.28 prior to 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS...
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.27.13
Linux Linux Kernel 2.6.27.15
Linux Linux Kernel 2.6.27.8
Linux Linux Kernel 2.6.27.9
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.27.5
Linux Linux Kernel 2.6.27.7
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.27.2
Linux Linux Kernel 2.6.27.11
NA
CVE-2004-0980
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 up to and including 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Angus Mackay Ez-ipupdate 3.0.11b5
Angus Mackay Ez-ipupdate 3.0.11b8
Debian Debian Linux 3.0
Gentoo Linux
NA
CVE-2006-0096
wan/sdla.c in Linux kernel 2.6.x prior to 2.6.11 and 2.4.x prior to 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exp...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.4.13
NA
CVE-2005-2490
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 prior to 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »