Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2019-14901
A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x prior to 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote malicious user to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat...
Linux Linux Kernel
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
10
CVSSv2
CVE-2011-2717
The DHCPv6 client (dhcp6c) as used in the dhcpv6 project through 2011-07-25 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
Linux Dhcp6c
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux 5.0
10
CVSSv2
CVE-2011-2523
vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which opens a shell on port 6200/tcp.
Vsftpd Project Vsftpd 2.3.4
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
2 Nmap scripts
36 Github repositories
10
CVSSv2
CVE-2019-14896
A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called a...
Linux Linux Kernel
Redhat Enterprise Linux 6.0
Fedoraproject Fedora 30
Fedoraproject Fedora 31
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Debian Debian Linux 8.0
10
CVSSv2
CVE-2014-3585
redhat-upgrade-tool: Does not check GPG signatures when upgrading versions
Redhat Redhat-upgrade-tool -
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
10
CVSSv2
CVE-2013-7171
Slackware 14.0 and 14.1, and Slackware LLVM 3.0-i486-2 and 3.3-i486-2, contain world-writable permissions on the /tmp directory which could allow remote malicious users to execute arbitrary code with root privileges.
Slackware Slackware Linux 14.0
Slackware Slackware Linux 14.1
10
CVSSv2
CVE-2011-1930
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote malicious user to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DH...
Klibc Project Klibc
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
1 EDB exploit
10
CVSSv2
CVE-2006-4243
linux vserver 2.6 prior to 2.6.17 suffers from privilege escalation in remount code.
Linux-vserver Linux-vserver
10
CVSSv2
CVE-2019-18780
An arbitrary command injection vulnerability in the Cluster Server component of Veritas InfoScale allows an unauthenticated remote malicious user to execute arbitrary commands as root or administrator. These Veritas products are affected: Access 7.4.2 and previous versions, Acces...
Veritas Access
Veritas Access Appliance
Veritas Flex Appliance
Veritas Infoscale
Veritas Cluster Server
Veritas Storage Foundation Ha
10
CVSSv2
CVE-2019-3689
The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and manag...
Linux-nfs Nfs-utils
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30924
CVE-2024-3400
overflow
CVE-2024-23528
CVE-2024-21338
CVE-2024-3818
CVE-2024-23535
NULL pointer dereference
elevation of privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »