Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
steve grubb vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-1601
The KVM implementation in the Linux kernel prior to 3.3.6 allows host OS users to cause a denial of service (NULL pointer dereference and host OS crash) by making a KVM_CREATE_IRQCHIP ioctl call after a virtual CPU already exists.
Linux Linux Kernel
NA
CVE-2012-2123
The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel prior to 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions ...
Linux Linux Kernel
NA
CVE-2012-2133
Use-after-free vulnerability in the Linux kernel prior to 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers...
Linux Linux Kernel 3.3.2
Linux Linux Kernel 3.3.3
Linux Linux Kernel 3.3.4
Linux Linux Kernel 3.3
Linux Linux Kernel
Linux Linux Kernel 3.3.1
NA
CVE-2004-0233
Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.
Sgi Propack 2.4
Sgi Propack 3.0
Utempter Utempter 0.5.2
Utempter Utempter 0.5.3
Slackware Slackware Linux
Slackware Slackware Linux 9.1
1 EDB exploit
NA
CVE-2003-0740
Stunnel 4.00, and 3.24 and previous versions, leaks a privileged file descriptor returned by listen(), which allows local users to hijack the Stunnel server.
Stunnel Stunnel 3.10
Stunnel Stunnel 3.11
Stunnel Stunnel 3.18
Stunnel Stunnel 3.19
Stunnel Stunnel 3.3
Stunnel Stunnel 3.4a
Stunnel Stunnel 3.16
Stunnel Stunnel 3.17
Stunnel Stunnel 3.21c
Stunnel Stunnel 3.22
Stunnel Stunnel 3.24
Stunnel Stunnel 3.12
Stunnel Stunnel 3.13
Stunnel Stunnel 3.20
Stunnel Stunnel 3.21
Stunnel Stunnel 3.7
Stunnel Stunnel 3.8
Stunnel Stunnel 3.14
Stunnel Stunnel 3.15
Stunnel Stunnel 3.21a
Stunnel Stunnel 3.21b
Stunnel Stunnel 3.9
1 EDB exploit
NA
CVE-2003-0211
Memory leak in xinetd 2.3.10 allows remote malicious users to cause a denial of service (memory consumption) via a large number of rejected connections.
Xinetd Xinetd 2.3.5
Xinetd Xinetd 2.3.6
Xinetd Xinetd 2.3.0
Xinetd Xinetd 2.3.1
Xinetd Xinetd 2.3.7
Xinetd Xinetd 2.3.8
Xinetd Xinetd 2.3.9
Xinetd Xinetd 2.3.10
Xinetd Xinetd 2.3.2
Xinetd Xinetd 2.3.3
Xinetd Xinetd 2.3.4
1 EDB exploit
NA
CVE-2007-0001
The file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise Linux (RHEL) 4 kernel 2.6.9 allows local users to cause a denial of service (kernel panic) by replacing a watched file, which does not cause the watch on the old inode to be dropped.
Redhat Enterprise Linux 4.0
1 EDB exploit
NA
CVE-2003-1307
The mod_php module for the Apache HTTP Server allows local users with write access to PHP scripts to send signals to the server's process group and use the server's file descriptors, as demonstrated by sending a STOP signal, then intercepting incoming connections on the...
Apache Http Server 2.0.42
Apache Http Server 2.0.47
Apache Http Server 2.0.28
Apache Http Server 2.0.35
Apache Http Server 2.0.37
Apache Http Server 2.0.32
Apache Http Server 2.0.44
Apache Http Server 2.0.34
Apache Http Server 2.0.39
Apache Http Server 2.0.46
Apache Http Server 2.0.41
Apache Http Server 2.0.9
Apache Http Server 2.0.38
Apache Http Server 2.0.48
Apache Http Server 2.0.45
Apache Http Server 2.0.40
Apache Http Server 2.0.36
Apache Http Server 2.0.43
Apache Http Server 2.0
2 EDB exploits
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2