Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 4.14 vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2020-25704
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
Linux Linux Kernel 5.10
Linux Linux Kernel
Debian Debian Linux 9.0
Starwindsoftware Starwind San \\& Nas V8r12
Starwindsoftware Command Center -
Starwindsoftware Starwind Virtual San V8
Starwindsoftware Starwind Hyperconverged Appliance -
1 Github repository
6.1
CVSSv2
CVE-2020-28974
A slab-out-of-bounds read in fbcon in the Linux kernel prior to 5.9.7 could be used by local malicious users to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulati...
Linux Linux Kernel
Debian Debian Linux 9.0
4.9
CVSSv2
CVE-2020-28941
An issue exists in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel up to and including 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line ...
Linux Linux Kernel
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
2.1
CVSSv2
CVE-2020-8694
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Core I7-8510y Firmware -
Intel Core I7-8500y Firmware -
Intel Core I5-8310y Firmware -
Intel Core I5-8210y Firmware -
Intel Core I5-8200y Firmware -
Intel Core M3-8100y Firmware -
Intel Core I7-7500u Firmware -
Intel Core I7-7510u Firmware -
Intel Core I7-7600u Firmware -
Intel Core I5-7200u Firmware -
Intel Core I5-7210u Firmware -
Intel Core I5-7300u Firmware -
Intel Core I5-7500u Firmware -
Intel Core I3-7007u Firmware -
Intel Core I3-7100u Firmware -
Intel Core I3-7110u Firmware -
Intel Core I3-7130u Firmware -
Intel Pentium 4415u Firmware -
Intel Celeron 3865u Firmware -
Intel Celeron 3965u Firmware -
Intel Core I7-7560u Firmware -
Intel Core I7-7567u Firmware -
1 Github repository
1 Article
4.6
CVSSv2
CVE-2020-27674
An issue exists in Xen up to and including 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
Xen Xen
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
4.9
CVSSv2
CVE-2020-27673
An issue exists in the Linux kernel up to and including 5.9.1, as used with Xen up to and including 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.
Linux Linux Kernel 5.10
Linux Linux Kernel
Debian Debian Linux 9.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Xen Xen
4.7
CVSSv2
CVE-2020-27675
An issue exists in the Linux kernel up to and including 5.9.1, as used with Xen up to and including 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference...
Linux Linux Kernel
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 9.0
2.1
CVSSv2
CVE-2020-25596
An issue exists in Xen up to and including 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly deli...
Xen Xen
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Debian Debian Linux 10.0
Opensuse Leap 15.2
7.2
CVSSv2
CVE-2020-25220
The Linux kernel 4.9.x prior to 4.9.233, 4.14.x prior to 4.14.194, and 4.19.x prior to 4.19.140 has a use-after-free because skcd->no_refcnt was not considered during a backport of a CVE-2020-14356 patch. This is related to the cgroups feature.
Linux Linux Kernel
3.3
CVSSv2
CVE-2020-3702
u'Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic' in Snapdragon Auto, Snapdragon Comp...
Qualcomm Apq8053 Firmware -
Qualcomm Ipq4019 Firmware -
Qualcomm Ipq8064 Firmware -
Qualcomm Msm8909w Firmware -
Qualcomm Msm8996au Firmware -
Qualcomm Qca9531 Firmware -
Qualcomm Qcn5502 Firmware -
Qualcomm Qcs405 Firmware -
Qualcomm Sdx20 Firmware -
Qualcomm Sm6150 Firmware -
Qualcomm Sm7150 Firmware -
Debian Debian Linux 10.0
Arista Access Point
Debian Debian Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »