Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kees cook vulnerabilities and exploits
(subscribe to this query)
5.9
CVSSv3
CVE-2012-3552
Race condition in the IP implementation in the Linux kernel prior to 3.0 might allow remote malicious users to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
Linux Linux Kernel
Redhat Enterprise Linux Eus 6.2
NA
CVE-2011-3148
Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) prior to 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.p...
Linux-pam Linux-pam 0.99.1.0
Linux-pam Linux-pam 0.99.2.0
Linux-pam Linux-pam 0.99.2.1
Linux-pam Linux-pam 0.99.3.0
Linux-pam Linux-pam 0.99.4.0
Linux-pam Linux-pam 0.99.5.0
Linux-pam Linux-pam 0.99.6.0
Linux-pam Linux-pam 0.99.6.1
Linux-pam Linux-pam 0.99.6.2
Linux-pam Linux-pam 0.99.6.3
Linux-pam Linux-pam 0.99.7.0
Linux-pam Linux-pam 0.99.7.1
Linux-pam Linux-pam 0.99.8.0
Linux-pam Linux-pam 0.99.8.1
Linux-pam Linux-pam 0.99.9.0
Linux-pam Linux-pam 0.99.10.0
Linux-pam Linux-pam 1.0.0
Linux-pam Linux-pam 1.0.1
Linux-pam Linux-pam 1.0.2
Linux-pam Linux-pam 1.0.3
Linux-pam Linux-pam 1.0.4
Linux-pam Linux-pam 1.1.0
NA
CVE-2011-3149
The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) prior to 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
Linux-pam Linux-pam 0.99.1.0
Linux-pam Linux-pam 0.99.2.0
Linux-pam Linux-pam 0.99.2.1
Linux-pam Linux-pam 0.99.3.0
Linux-pam Linux-pam 0.99.4.0
Linux-pam Linux-pam 0.99.5.0
Linux-pam Linux-pam 0.99.6.0
Linux-pam Linux-pam 0.99.6.1
Linux-pam Linux-pam 0.99.6.2
Linux-pam Linux-pam 0.99.6.3
Linux-pam Linux-pam 0.99.7.0
Linux-pam Linux-pam 0.99.7.1
Linux-pam Linux-pam 0.99.8.0
Linux-pam Linux-pam 0.99.8.1
Linux-pam Linux-pam 0.99.9.0
Linux-pam Linux-pam 0.99.10.0
Linux-pam Linux-pam 1.0.0
Linux-pam Linux-pam 1.0.1
Linux-pam Linux-pam 1.0.2
Linux-pam Linux-pam 1.0.3
Linux-pam Linux-pam 1.0.4
Linux-pam Linux-pam 1.1.0
NA
CVE-2011-1476
Integer underflow in the Open Sound System (OSS) subsystem in the Linux kernel prior to 2.6.39 on unspecified non-x86 platforms allows local users to cause a denial of service (memory corruption) by leveraging write access to /dev/sequencer.
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1477
Multiple array index errors in sound/oss/opl3.c in the Linux kernel prior to 2.6.39 allow local users to cause a denial of service (heap memory corruption) or possibly gain privileges by leveraging write access to /dev/sequencer.
Linux Linux Kernel
Suse Linux Enterprise Desktop 10
NA
CVE-2011-1493
Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel prior to 2.6.39 allows remote malicious users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data tha...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1160
The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel prior to 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel prior to 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1079
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel prior to 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause ...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
NA
CVE-2011-1080
The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel prior to 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveragi...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »