Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian linux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-4536
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and previous versions handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote malicious users to bypass packet filte...
Linux Linux Kernel
Debian Debian Linux 4.0
Debian Debian Linux 5.0
NA
CVE-2009-4538
drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and previous versions does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote malicious users to have an unspecified impact via crafted packets, a related issue t...
Linux Linux Kernel
Debian Debian Linux 4.0
Debian Debian Linux 5.0
5.5
CVSSv3
CVE-2020-36311
An issue exists in the Linux kernel prior to 5.9. arch/x86/kvm/svm/sev.c allows malicious users to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.
Linux Linux Kernel
Debian Debian Linux 9.0
Debian Debian Linux 10.0
6.8
CVSSv3
CVE-2023-2002
A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an malicious user to unauthorized execution of management commands, compromising the confidentiality, integrity, and ava...
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
1 Github repository
5.5
CVSSv3
CVE-2020-27830
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
Linux Linux Kernel
Debian Debian Linux 9.0
Debian Debian Linux 10.0
5.5
CVSSv3
CVE-2021-34693
net/can/bcm.c in the Linux kernel up to and including 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
Linux Linux Kernel
Debian Debian Linux 9.0
Debian Debian Linux 10.0
NA
CVE-2009-0029
The ABI in the Linux kernel 2.6.28 and previous versions on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users t...
Linux Linux Kernel
Debian Debian Linux 5.0
Debian Debian Linux 4.0
1 Github repository
4.7
CVSSv3
CVE-2022-33744
Arm guests can cause Dom0 DoS via PV devices When mapping pages of guests on Arm, dom0 is using an rbtree to keep track of the foreign mappings. Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used b...
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
7.8
CVSSv3
CVE-2023-3610
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP...
Linux Linux Kernel
Debian Debian Linux 10.0
Debian Debian Linux 11.0
NA
CVE-2010-0003
The print_fatal_signal function in kernel/signal.c in the Linux kernel prior to 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and ...
Linux Linux Kernel
Debian Debian Linux 5.0
Debian Debian Linux 4.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »