Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux_kernel vulnerabilities and exploits
(subscribe to this query)
4.4
CVSSv3
CVE-2023-20675
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588569.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
4.4
CVSSv3
CVE-2023-20677
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588436.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
4.4
CVSSv3
CVE-2023-20679
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588453.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
6.7
CVSSv3
CVE-2023-20682
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441605; Issue ID: ALPS07441605.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
6.7
CVSSv3
CVE-2023-20659
In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588413.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
6.7
CVSSv3
CVE-2023-20661
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
6.7
CVSSv3
CVE-2023-20662
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560765; Issue ID: ALPS07560765.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
7.5
CVSSv3
CVE-2009-4272
A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote malicious users to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing "...
Linux Linux Kernel 2.6.18
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.4
Redhat Virtualization 5.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-38028
CVE-2024-32406
CVE-2024-25624
IMAP
CVE-2024-2310
CVE-2024-0874
CVE-2024-20359
XXE
remote code execution
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6