Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
marco ivaldi vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2006-1524
madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally w...
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16.5
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16
Linux Linux Kernel 2.6.16.1
Linux Linux Kernel 2.6.16.2
NA
CVE-2006-1525
ip_route_input in Linux kernel 2.6 prior to 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.13.1
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.15.5
Linux Linux Kernel 2.6.15
NA
CVE-2006-1056
The Linux kernel prior to 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine p...
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.6
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.1
Linux Linux Kernel 2.6.14.5
Linux Linux Kernel 2.6.14.6
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.15.1
Linux Linux Kernel 2.6.16.3
Linux Linux Kernel 2.6.16.4
Linux Linux Kernel 2.6.16 Rc7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
NA
CVE-2006-0744
Linux kernel prior to 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.15.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.11.2
NA
CVE-2004-1364
Directory traversal vulnerability in extproc in Oracle 9i and 10g allows remote malicious users to access arbitrary libraries outside of the $ORACLE_HOME\bin directory.
Oracle Application Server 9.0.2.0.1
Oracle Application Server 9.0.2.1
Oracle Collaboration Suite Release 1
Oracle Application Server
Oracle Application Server 9.0.3
Oracle Application Server 9.0.3.1
Oracle Application Server 9.0.4
Oracle E-business Suite 11.5.4
Oracle E-business Suite 11.5.5
Oracle Enterprise Manager Database Control 10.1.2
Oracle Enterprise Manager Grid Control 10.1.0.2
Oracle Oracle8i Enterprise 8.0.6 .0.0
Oracle Oracle8i Enterprise 8.0.6 .0.1
Oracle Oracle8i Enterprise 8.1.7 .1.0
Oracle Oracle8i Enterprise 8.1.7 .4
Oracle Oracle8i Standard 8.1.7 .1
Oracle Oracle8i Standard 8.1.7 .4
Oracle Oracle9i Enterprise 9.2.0.1
Oracle Oracle9i Enterprise 9.2.0.2
Oracle Oracle9i Personal 9.0.1.5
Oracle Oracle9i Personal 9.2
Oracle Oracle9i Standard 9.0
2 EDB exploits
NA
CVE-2006-4842
The Netscape Portable Runtime (NSPR) API 4.6.1 and 4.6.2, as used in Sun Solaris 10, trusts user-specified environment variables for specifying log files even when running from setuid programs, which allows local users to create or overwrite arbitrary files.
Netscape Portable Runtime Api 4.6.2
Netscape Portable Runtime Api 4.6.1
Sun Solaris 10.0
6 EDB exploits
8.8
CVSSv3
CVE-2020-2696
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Common Desktop Environment). The supported version that is affected is 10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to c...
Oracle Solaris 10
1 Article
NA
CVE-2003-0834
Buffer overflow in CDE libDtHelp library allows local users to execute arbitrary code via (1) a modified DTHELPUSERSEARCHPATH environment variable and the Help feature, (2) DTSEARCHPATH, or (3) LOGNAME.
Sco Unixware 7.1.1
Sco Unixware 7.1.3
Sco Open Unix 8.0
2 EDB exploits
8.8
CVSSv3
CVE-2019-3010
Vulnerability in the Oracle Solaris product of Oracle Systems (component: XScreenSaver). The supported version that is affected is 11. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Orac...
Oracle Solaris 11
1 EDB exploit
1 Github repository
NA
CVE-2006-5229
OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote malicious users to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as d...
Openbsd Openssh 4.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »