Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
s. krahmer vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-0003
The print_fatal_signal function in kernel/signal.c in the Linux kernel prior to 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and ...
Linux Linux Kernel
Debian Debian Linux 5.0
Debian Debian Linux 4.0
NA
CVE-2009-2691
The mm_for_maps function in fs/proc/base.c in the Linux kernel 2.6.30.4 and previous versions allows local users to read (1) maps and (2) smaps files under proc/ via vectors related to ELF loading, a setuid process, and a race condition.
Linux Linux Kernel 2.6.30
Linux Linux Kernel 2.6.30.2
Linux Linux Kernel 2.6.30.1
Linux Linux Kernel
NA
CVE-2009-2695
The Linux kernel prior to 2.6.31-rc7 does not properly prevent mmap operations that target page zero and other low memory addresses, which allows local users to gain privileges by exploiting NULL pointer dereference vulnerabilities, related to (1) the default configuration of the...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.11.10
NA
CVE-2000-0171
atsadc in the atsar package for Linux does not properly check the permissions of an output file, which allows local users to gain root privileges.
At Computing Atsar Linux 1.4
1 EDB exploit
NA
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
4 EDB exploits
NA
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 4.1
Freebsd Freebsd 3.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1.1
Freebsd Freebsd 2.0
1 EDB exploit
NA
CVE-2002-1463
Symantec Raptor Firewall 6.5 and 6.5.3, Enterprise Firewall 6.5.2 and 7.0, VelociRaptor Models 500/700/1000 and 1100/1200/1300, and Gateway Security 5110/5200/5300 generate easily predictable initial sequence numbers (ISN), which allows remote malicious users to spoof connections...
Symantec Enterprise Firewall 7.0
Symantec Velociraptor Model 500
Symantec Velociraptor Model 1100
Symantec Raptor Firewall 6.5.3
Symantec Velociraptor Model 1200
Symantec Raptor Firewall 6.5
Symantec Velociraptor Model 1000
Symantec Enterprise Firewall 6.5.2
Symantec Velociraptor Model 700
Symantec Velociraptor Model 1300
Symantec Gateway Security 5110
Symantec Gateway Security 5300
Symantec Gateway Security 5200
1 EDB exploit
NA
CVE-2004-0641
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Thomson Speedtouch 510 Adsl Router
1 EDB exploit
NA
CVE-2001-0751
Cisco switches and routers running CBOS 2.3.8 and previous versions use predictable TCP Initial Sequence Numbers (ISN), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Cbos
1 EDB exploit
NA
CVE-2001-0328
TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote malicious users to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN.
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »