Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
r project vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2012-1097
The regset (aka register set) feature in the Linux kernel prior to 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GET...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
Redhat Enterprise Mrg 2.0
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
4.7
CVSSv2
CVE-2012-0045
The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel prior to 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstr...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.2.10
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.33
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.2.4
1 EDB exploit
4
CVSSv2
CVE-2011-4347
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel prior to 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of servi...
Linux Linux Kernel 3.1.3
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.1.1
Linux Linux Kernel 3.1.8
Linux Linux Kernel 3.1.5
Linux Linux Kernel
Linux Linux Kernel 3.1.7
Linux Linux Kernel 3.1.6
Linux Linux Kernel 3.1.4
3.3
CVSSv2
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel prior to 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.38
Linux Linux Kernel
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.37
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.40
Linux Linux Kernel 3.0.33
7.2
CVSSv2
CVE-2009-4067
Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel prior to 2.6.27 allows physically proximate malicious users to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
Linux Linux Kernel
Redhat Enterprise Linux 4.0
1 EDB exploit
3.6
CVSSv2
CVE-2003-0018
Linux kernel 2.4.10 up to and including 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
2.1
CVSSv2
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
1.2
CVSSv2
CVE-2003-0462
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
Mandrakesoft Mandrake Multi Network Firewall 8.2
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.9
Mandrakesoft Mandrake Linux 8.2
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
1 EDB exploit
2.1
CVSSv2
CVE-2003-0476
The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.
Linux Linux Kernel 2.4.0
2.1
CVSSv2
CVE-2003-0501
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
Linux Linux Kernel 2.6.20.1
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »