Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian apt vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2005-3847
The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions prior to 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
Linux Linux Kernel
Debian Debian Linux 3.1
NA
CVE-2005-3848
Memory leak in the icmp_push_reply function in Linux 2.6 prior to 2.6.12.6 and 2.6.13 allows remote malicious users to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_p...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.11.3
NA
CVE-2005-3806
The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 prior to 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-a...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.11.6
NA
CVE-2005-3783
The ptrace functionality (ptrace.c) in Linux kernel 2.6 prior to 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash).
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.4
NA
CVE-2005-3784
The auto-reap of child processes in Linux kernel 2.6 prior to 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.14.3
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.14.5
Linux Linux Kernel 2.6.13.2
Linux Linux Kernel 2.6.13.5
Linux Linux Kernel 2.6.14.1
Linux Linux Kernel 2.6.12.5
Linux Linux Kernel 2.6.14.6
Linux Linux Kernel 2.6.12.1
NA
CVE-2005-2709
The sysctl functionality (sysctl.c) in Linux kernel prior to 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and ...
Linux Linux Kernel 2.6.13.4
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.12.3
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.11.4
Linux Linux Kernel 2.6.11.3
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.4.35.3
Linux Linux Kernel 2.4.36.7
Linux Linux Kernel 2.4.37.1
Linux Linux Kernel 2.4.37
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.37.2
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.10
1 EDB exploit
NA
CVE-2005-2973
The udp_v6_get_port function in udp.c in Linux 2.6 prior to 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.11.5
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.12.1
Linux Linux Kernel 2.6.11.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12.4
Linux Linux Kernel 2.6.11.3
1 EDB exploit
NA
CVE-2005-3257
The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using loadkeys.
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.6.12
1 EDB exploit
NA
CVE-2005-3180
The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and previous versions does not properly clear memory from a previously used packet whose length is increased, which allows remote malicious users to obtain sensitive information.
Linux Linux Kernel
NA
CVE-2005-3181
The audit system in Linux kernel 2.6.6, and other versions prior to 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows malic...
Linux Linux Kernel
Canonical Ubuntu Linux 4.10
Canonical Ubuntu Linux 5.04
Debian Debian Linux 3.1
Mandriva Linux 10.1
Mandriva Linux 10.2
Mandriva Linux 2006.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »