Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network block device project network block device vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-3181
The audit system in Linux kernel 2.6.6, and other versions prior to 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows malic...
Linux Linux Kernel
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
Debian Debian Linux 3.1
Mandriva Linux 10.1
Mandriva Linux 10.2
Mandriva Linux 2006.0
NA
CVE-2005-3053
The sys_set_mempolicy function in mempolicy.c in Linux kernel 2.6.x allows local users to cause a denial of service (kernel BUG()) via a negative first argument.
Linux Linux Kernel 2.6.0
NA
CVE-2005-3055
Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.13.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.13.2
Debian Debian Linux 3.1
NA
CVE-2005-3044
Multiple vulnerabilities in Linux kernel prior to 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
NA
CVE-2005-2490
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 prior to 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
NA
CVE-2005-2800
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and previous versions allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly h...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.12
1 EDB exploit
NA
CVE-2005-2457
The driver for compressed ISO file systems (zisofs) in the Linux kernel prior to 2.6.12.5 allows local users and remote malicious users to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.11.1
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.7
Linux Linux Kernel 2.6.11.8
NA
CVE-2005-2555
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
Debian Debian Linux 3.1
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
NA
CVE-2005-0449
The netfilter/iptables module in Linux prior to 2.6.8.1 allows remote malicious users to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
NA
CVE-2005-0124
The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x prior to 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »