Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
matrix project vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2013-0231
The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some o...
Xen Xen 3.0.4
Xen Xen 3.0.2
Xen Xen 3.2.0
Xen Xen 3.1.3
Xen Xen 3.2.3
Xen Xen 3.0.3
Xen Xen 3.1.4
Linux Linux Kernel 2.6.18
Linux Linux Kernel 3.8
Xen Xen 3.2.1
Xen Xen 3.2.2
1.9
CVSSv2
CVE-2012-4461
The KVM subsystem in the Linux kernel prior to 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling...
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.6.2
Linux Linux Kernel 3.6.6
Linux Linux Kernel
Linux Linux Kernel 3.6.4
Linux Linux Kernel 3.6.1
Linux Linux Kernel 3.6
Linux Linux Kernel 3.6.3
Linux Linux Kernel 3.6.5
1.9
CVSSv2
CVE-2012-4508
Race condition in fs/ext4/extents.c in the Linux kernel prior to 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.4.1
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.4
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.2.26
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
7.1
CVSSv2
CVE-2012-3552
Race condition in the IP implementation in the Linux kernel prior to 3.0 might allow remote malicious users to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
Linux Linux Kernel
Redhat Enterprise Linux Eus 6.2
3.3
CVSSv2
CVE-2011-1833
Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel prior to 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.0.38
Linux Linux Kernel
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.37
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.40
Linux Linux Kernel 3.0.33
4.9
CVSSv2
CVE-2011-4086
The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel prior to 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesyst...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.2
Linux Linux Kernel 3.2.16
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
4.7
CVSSv2
CVE-2012-0045
The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel prior to 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstr...
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.4
Linux Linux Kernel 3.0.27
Linux Linux Kernel 3.2.11
Linux Linux Kernel 3.0.23
Linux Linux Kernel 3.2.10
Linux Linux Kernel 3.0.8
Linux Linux Kernel 3.0.33
Linux Linux Kernel 3.0.28
Linux Linux Kernel 3.2.4
1 EDB exploit
4
CVSSv2
CVE-2012-2133
Use-after-free vulnerability in the Linux kernel prior to 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers...
Linux Linux Kernel 3.3.2
Linux Linux Kernel 3.3.3
Linux Linux Kernel 3.3.4
Linux Linux Kernel 3.3
Linux Linux Kernel
Linux Linux Kernel 3.3.1
1.9
CVSSv2
CVE-2011-1078
The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel prior to 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option.
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
5.4
CVSSv2
CVE-2011-1079
The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel prior to 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause ...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »