Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arch linux vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2003-0248
The mxcsr code in Linux kernel 2.4 allows malicious users to modify CPU state registers via a malformed address.
Redhat Linux 7.3
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.1
Redhat Linux 7.2
829
VMScore
CVE-2014-9803
arch/arm64/include/asm/pgtable.h in the Linux kernel prior to 3.15-rc5-next-20140519, as used in Android prior to 2016-07-05 on Nexus 5X and 6P devices, mishandles execute-only pages, which allows malicious users to gain privileges via a crafted application, aka Android internal ...
Linux Linux Kernel
Google Android
756
VMScore
CVE-2020-5291
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root pe...
Projectatomic Bubblewrap
Debian Debian Linux 10.0
Archlinux Arch Linux -
Centos Centos 7.0
740
VMScore
CVE-2013-1763
Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in the Linux kernel prior to 3.7.10 allows local users to gain privileges via a large family value in a Netlink message.
Linux Linux Kernel
4 EDB exploits
1 Github repository
740
VMScore
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.11
4 EDB exploits
735
VMScore
CVE-2003-0985
The mremap system call (do_mremap) in Linux kernel 2.4.x prior to 2.4.21, and possibly other versions prior to 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual m...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.4
3 EDB exploits
730
VMScore
CVE-2004-0077
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges...
Redhat Kernel 2.4.20-8
Redhat Kernel Doc 2.4.20-8
Redhat Bigmem Kernel 2.4.20-8
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
2 EDB exploits
730
VMScore
CVE-2003-0961
Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and previous versions allows local users to gain root privileges.
Linux Linux Kernel
2 EDB exploits
725
VMScore
CVE-2015-3290
arch/x86/entry/entry_64.S in the Linux kernel prior to 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
Linux Linux Kernel
1 EDB exploit
725
VMScore
CVE-2010-3301
The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel prior to 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by trigg...
Linux Linux Kernel 2.6.36
Linux Linux Kernel
Suse Linux Enterprise Real Time Extension 11
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »