Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
azure stack vulnerabilities and exploits
(subscribe to this query)
6.7
CVSSv3
CVE-2022-20369
In v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: An...
Google Android -
Debian Debian Linux 10.0
7.8
CVSSv3
CVE-2018-14678
An issue exists in the Linux kernel up to and including 4.17.11, as used in Xen up to and including 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memo...
Linux Linux Kernel
Xen Xen
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
7
CVSSv3
CVE-2019-13233
In arch/x86/lib/insn-eval.c in the Linux kernel prior to 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
Linux Linux Kernel
5.5
CVSSv3
CVE-2018-17972
An issue exists in the proc_pid_stack function in fs/proc/base.c in the Linux kernel up to and including 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local malicious user to exploit racy stack unwinding and leak kernel t...
Linux Linux Kernel
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Eus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux Server 7.6
Debian Debian Linux 8.0
7.1
CVSSv3
CVE-2020-9383
An issue exists in the Linux kernel 3.16 up to and including 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
Linux Linux Kernel
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Opensuse Leap 15.1
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 19.10
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Steelstore Cloud Integrated Storage -
Netapp Data Availability Services -
Netapp Solidfire -
Netapp Hci Management Node -
Netapp Active Iq Unified Manager -
Netapp Solidfire Baseboard Management Controller Firmware -
Netapp H410c Firmware -
4.2
CVSSv3
CVE-2022-41849
drivers/video/fbdev/smscufx.c in the Linux kernel up to and including 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.
Linux Linux Kernel
Debian Debian Linux 10.0
4.7
CVSSv3
CVE-2022-41850
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel up to and including 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.
Linux Linux Kernel
Debian Debian Linux 10.0
7.1
CVSSv3
CVE-2020-8648
There is a use-after-free vulnerability in the Linux kernel up to and including 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
Linux Linux Kernel
Debian Debian Linux 8.0
Opensuse Leap 15.1
Netapp Cloud Backup -
Netapp Active Iq Unified Manager -
Netapp Solidfire Baseboard Management Controller -
Broadcom Brocade Fabric Operating System Firmware -
Netapp Hci Baseboard Management Controller H410c
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 14.04
5.5
CVSSv3
CVE-2022-3524
A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply ...
Linux Linux Kernel 2.6.12
Linux Linux Kernel
Debian Debian Linux 10.0
5.3
CVSSv3
CVE-2020-10942
In the Linux kernel prior to 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow malicious users to trigger kernel stack corruption via crafted system calls.
Linux Linux Kernel
Opensuse Leap 15.1
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »