Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arp protocol arp protocol vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-1748
The raw_release function in net/can/raw.c in the Linux kernel prior to 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release o...
Linux Linux Kernel 2.6.39
Linux Linux Kernel
6.1
CVSSv3
CVE-2011-1776
The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel prior to 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate malicious users to cause a denial of service (heap-based buff...
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server Aus 5.6
Redhat Enterprise Linux Server Eus 5.6
NA
CVE-2011-1182
kernel/signal.c in the Linux kernel prior to 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
NA
CVE-2011-0695
Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote malicious users to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which ...
Linux Linux Kernel
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Server Aus 5.6
Redhat Enterprise Linux Workstation 5.0
Canonical Ubuntu Linux 8.04
NA
CVE-2011-0711
The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel prior to 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
Linux Linux Kernel 2.6.38
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Server Aus 5.6
Redhat Enterprise Linux Server Eus 5.6
NA
CVE-2011-1093
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel prior to 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote malicious users to cause a denial of service (...
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
NA
CVE-2011-1767
net/ipv4/ip_gre.c in the Linux kernel prior to 2.6.34, when ip_gre is configured as a module, allows remote malicious users to cause a denial of service (OOPS) by sending a packet during module loading.
Linux Linux Kernel 2.6.33.7
Linux Linux Kernel 2.6.33.9
Linux Linux Kernel 2.6.33.18
Linux Linux Kernel 2.6.33.14
Linux Linux Kernel 2.6.33.19
Linux Linux Kernel 2.6.33.2
Linux Linux Kernel 2.6.33.6
Linux Linux Kernel 2.6.33.17
Linux Linux Kernel 2.6.33.1
Linux Linux Kernel 2.6.33.4
Linux Linux Kernel 2.6.33
Linux Linux Kernel 2.6.33.12
Linux Linux Kernel 2.6.33.3
Linux Linux Kernel 2.6.33.13
Linux Linux Kernel 2.6.33.11
Linux Linux Kernel 2.6.33.15
Linux Linux Kernel 2.6.33.16
Linux Linux Kernel
Linux Linux Kernel 2.6.33.8
Linux Linux Kernel 2.6.33.5
Linux Linux Kernel 2.6.33.10
NA
CVE-2011-0726
The do_task_stat function in fs/proc/array.c in the Linux kernel prior to 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file fo...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.32.5
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.35
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.26
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.33.7
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
NA
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel prior to 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by pr...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1170
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel prior to 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive infor...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.32.5
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.35
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.26
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.33.7
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
CVE-2024-20360
CVE-2021-47559
XXE
CVE-2024-5229
CVE-2021-47543
CVE-2021-47571
SSTI
CVE-2024-4978
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »