Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ilja van sprundel vulnerabilities and exploits
(subscribe to this query)
534
VMScore
CVE-2007-3851
The drm/i915 component in the Linux kernel prior to 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
Linux Linux Kernel
187
VMScore
CVE-2005-2553
The find_target function in ptrace32.c in the Linux kernel 2.4.x prior to 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on ...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.10
329
VMScore
CVE-2005-1768
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 prior to 2.4.31 and 2.6 prior to 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.23
543
VMScore
CVE-2007-2876
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 prior to 2.6.20.13, and 2.6.21.x prior to 2.6.21.4, allows remote malicious users to cause a denial of service by causing certain invalid states that trigger ...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.12.12
Linux Linux Kernel 2.6.19
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
169
VMScore
CVE-2007-3848
Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).
Linux Linux Kernel
436
VMScore
CVE-2007-2525
Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel prior to 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
Linux Linux Kernel
670
VMScore
CVE-2020-8597
eap.c in pppd in ppp 2.4.2 up to and including 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
Point-to-point Protocol Project Point-to-point Protocol
Wago Pfc Firmware
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
6 Github repositories
418
VMScore
CVE-2007-2172
A typo in Linux kernel 2.6 prior to 2.6.21-rc6 and 2.4 prior to 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
Linux Linux Kernel 2.6.21
Linux Linux Kernel
Debian Debian Linux 3.1
Debian Debian Linux 4.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
605
VMScore
CVE-2007-4311
The xfer_secondary_pool function in drivers/char/random.c in the Linux kernel 2.4 prior to 2.4.35 performs reseed operations on only the first few bytes of a buffer, which might make it easier for malicious users to predict the output of the random number generator, related to in...
Linux Linux Kernel
356
VMScore
CVE-2006-6054
The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.17.2
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.17.8
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.17.4
Linux Linux Kernel 2.6.16.18
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27802
template injection
CVE-2024-0044
code injection
CVE-2024-35474
CVE-2024-27857
CVE-2024-23251
CVE-2024-23692
physical
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »