Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dan rosenberg vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-1182
kernel/signal.c in the Linux kernel prior to 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
NA
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel prior to 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.38
Linux Linux Kernel
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.37
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.40
Linux Linux Kernel 3.0.33
NA
CVE-2012-0045
The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel prior to 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstr...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.2.10
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.33
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.2.4
1 EDB exploit
NA
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel prior to 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveragi...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-0006
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel prior to 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by le...
Linux Linux Kernel
Linux Linux Kernel 2.6.36.3
Linux Linux Kernel 2.6.36.1
Linux Linux Kernel 2.6.36.2
NA
CVE-2012-0028
The robust futex implementation in the Linux kernel prior to 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.27.52
Linux Linux Kernel 2.6.27.50
Linux Linux Kernel 2.6.27.30
Linux Linux Kernel 2.6.27.45
Linux Linux Kernel 2.6.27.34
Linux Linux Kernel 2.6.27.18
Linux Linux Kernel 2.6.27.37
Linux Linux Kernel 2.6.27.21
Linux Linux Kernel 2.6.27.27
Linux Linux Kernel 2.6.27.10
Linux Linux Kernel 2.6.27.17
Linux Linux Kernel 2.6.27.16
Linux Linux Kernel 2.6.27.20
Linux Linux Kernel 2.6.27.49
Linux Linux Kernel 2.6.27.4
Linux Linux Kernel 2.6.27
Linux Linux Kernel 2.6.27.33
Linux Linux Kernel 2.6.27.13
NA
CVE-2010-4648
The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel prior to 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote malicious users to obtain access to a Wi-Fi network by reading Wi-Fi frames.
Linux Linux Kernel
Linux Linux Kernel 2.6.36.3
Linux Linux Kernel 2.6.36.1
Linux Linux Kernel 2.6.36.2
NA
CVE-2011-4324
The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel prior to 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
Linux Linux Kernel
Linux Linux Kernel 2.6.28.4
Linux Linux Kernel 2.6.28.2
Linux Linux Kernel 2.6.28.5
Linux Linux Kernel 2.6.28.8
Linux Linux Kernel 2.6.28.3
Linux Linux Kernel 2.6.28.9
Linux Linux Kernel 2.6.28.6
Linux Linux Kernel 2.6.28.7
Linux Linux Kernel 2.6.28.1
Linux Linux Kernel 2.6.28
NA
CVE-2011-1079
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel prior to 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause ...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel prior to 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »