Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.8.1 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2005-1762
The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address.
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.10
2.1
CVSSv2
CVE-2005-1765
syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.10
6.9
CVSSv2
CVE-2005-0767
Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1 allows local users with DRI privileges to execute arbitrary code as root.
Linux Linux Kernel 2.6.8.1
2.1
CVSSv2
CVE-2005-0756
ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).
Linux Linux Kernel 2.6.8.1
7.8
CVSSv2
CVE-2005-0209
Netfilter in Linux kernel 2.6.8.1 allows remote malicious users to cause a denial of service (kernel crash) via crafted IP packet fragments.
Linux Linux Kernel 2.6.8.1
7.8
CVSSv2
CVE-2005-0177
nls_ascii.c in Linux prior to 2.6.8.1 uses an incorrect table size, which allows malicious users to cause a denial of service (kernel crash) via a buffer overflow.
Linux Linux Kernel 2.6.8.1
4.9
CVSSv2
CVE-2005-0210
Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
Linux Linux Kernel 2.6.8.1
2.1
CVSSv2
CVE-2005-0136
The Linux kernel prior to 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.10
2.1
CVSSv2
CVE-2005-0204
Linux kernel prior to 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.8.1
7.2
CVSSv2
CVE-2005-0839
Linux kernel 2.6 prior to 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.10
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2024-6437
CVE-2024-47517
CVE-2024-9131
CVE-2025-0283
insecure direct object reference
CVE-2024-49113
reflected XSS
firmware
CVE-2024-54847
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »