Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ubuntu ubuntu linux 5.10 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2022-0185
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced...
Linux Linux Kernel
Netapp H410c Firmware -
Netapp H300s Firmware -
Netapp H500s Firmware -
Netapp H700s Firmware -
Netapp H300e Firmware -
Netapp H500e Firmware -
Netapp H700e Firmware -
Netapp H410s Firmware -
14 Github repositories
2 Articles
7.2
CVSSv2
CVE-2021-33909
fs/seq_file.c in the Linux kernel 3.16 up to and including 5.13.x prior to 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.
Linux Linux Kernel
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Netapp Solidfire -
Netapp Hci Management Node -
Oracle Communications Session Border Controller 8.3
Oracle Communications Session Border Controller 8.4
Oracle Communications Session Border Controller 9.0
Oracle Communications Session Border Controller 8.2
Sonicwall Sma1000 Firmware
9 Github repositories
7.2
CVSSv2
CVE-2021-3489
The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an malicious user to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed ...
Linux Linux Kernel
Linux Linux Kernel 5.13
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 20.10
Canonical Ubuntu Linux 21.04
1 Github repository
7.2
CVSSv2
CVE-2021-3490
The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4...
Linux Linux Kernel
Linux Linux Kernel 5.13
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 20.10
Canonical Ubuntu Linux 21.04
6 Github repositories
1 Article
7.2
CVSSv2
CVE-2021-3491
The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/<PID>/mem. This could be used to create a heap overflow leading to arbitrary code e...
Linux Linux Kernel
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 20.10
Canonical Ubuntu Linux 21.04
7.2
CVSSv2
CVE-2006-5751
Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel prior to 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.7
7.2
CVSSv2
CVE-2006-3378
passwd command in shadow in Ubuntu 5.04 up to and including 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 5.04
7.2
CVSSv2
CVE-2006-1183
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges.
Ubuntu Ubuntu Linux 5.10
1 EDB exploit
7.2
CVSSv2
CVE-2006-0151
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158.
Todd Miller Sudo 1.5.8
Todd Miller Sudo 1.6
Todd Miller Sudo 1.6.1
Todd Miller Sudo 1.6.3 P5
Todd Miller Sudo 1.6.3 P6
Todd Miller Sudo 1.6.6
Todd Miller Sudo 1.6.7
Todd Miller Sudo 1.6.8 P7
Todd Miller Sudo 1.6.8 P8
Todd Miller Sudo 1.5.9
Todd Miller Sudo 1.6.3 P3
Todd Miller Sudo 1.6.3 P4
Todd Miller Sudo 1.6.5 P1
Todd Miller Sudo 1.6.5 P2
Todd Miller Sudo 1.6.8 P2
Todd Miller Sudo 1.6.8 P5
Todd Miller Sudo 1.5.6
Todd Miller Sudo 1.5.7
Todd Miller Sudo 1.6.3 P1
Todd Miller Sudo 1.6.3 P2
Todd Miller Sudo 1.6.4 P1
Todd Miller Sudo 1.6.4 P2
1 Github repository
7.1
CVSSv2
CVE-2006-4997
The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote malicious users to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference...
Linux Linux Kernel
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 5.10
Canonical Ubuntu Linux 6.06
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 4
Redhat Enterprise Linux 3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »