Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ilja van sprundel vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2020-15566
An issue exists in Xen up to and including 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the mem...
Xen Xen
Debian Debian Linux 10.0
NA
CVE-2007-2453
The random number feature in Linux kernel 2.6 prior to 2.6.20.13, and 2.6.21.x prior to 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the random number generator to provide the same va...
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12.12
Linux Linux Kernel 2.6.12.2
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.13.4
Linux Linux Kernel 2.6.13.5
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.6.14.7
Linux Linux Kernel 2.6.15.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.15
Linux Linux Kernel 2.6.16.12
Linux Linux Kernel 2.6.16.13
Linux Linux Kernel 2.6.16.2
Linux Linux Kernel 2.6.16.20
Linux Linux Kernel 2.6.16.27
Linux Linux Kernel 2.6.16.28
6.5
CVSSv3
CVE-2020-25597
An issue exists in Xen up to and including 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life...
Xen Xen
Fedoraproject Fedora 31
8.8
CVSSv3
CVE-2020-15565
An issue exists in Xen up to and including 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them requir...
Xen Xen
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.1
Opensuse Leap 15.2
5.5
CVSSv3
CVE-2020-25600
An issue exists in Xen up to and including 4.14.x. Out of bounds event channels are available to 32-bit x86 domains. The so called 2-level event channel model imposes different limits on the number of usable event channels for 32-bit x86 domains vs 64-bit or Arm (either bitness) ...
Xen Xen
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Opensuse Leap 15.2
Debian Debian Linux 10.0
1 Github repository
NA
CVE-2014-8103
X.Org Server (aka xserver and xorg-server) 1.15.0 up to and including 1.16.x prior to 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_q...
X.org Xorg-server 1.16.0
X.org Xorg-server 1.15.2
X.org Xorg-server 1.16.1
X.org Xorg-server 1.15.1
X.org Xorg-server 1.16.1.901
X.org Xorg-server 1.15.0
X.org Xorg-server 1.15.0.901
X.org Xorg-server 1.16.2.901
X.org Xorg-server 1.16.0.901
X.org Xorg-server 1.15.99.902
X.org Xorg-server 1.16.2
X.org Xorg-server 1.15.99.903
X.org Xorg-server 1.15.99.904
X.org Xorg-server 1.16.2.99.901
X.org Xorg-server 1.15.99.901
7.8
CVSSv3
CVE-2020-15567
An issue exists in Xen up to and including 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of no...
Xen Xen
Debian Debian Linux 10.0
Opensuse Leap 15.1
Opensuse Leap 15.2
Fedoraproject Fedora 31
Fedoraproject Fedora 32
NA
CVE-2007-1353
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel prior to 2.4.34.3 allows context-dependent malicious users to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitia...
Linux Linux Kernel
NA
CVE-2005-1768
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 prior to 2.4.31 and 2.6 prior to 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.24
NA
CVE-2007-3513
The lcd_write function in drivers/usb/misc/usblcd.c in the Linux kernel prior to 2.6.22-rc7 does not limit the amount of memory used by a caller, which allows local users to cause a denial of service (memory consumption).
Linux Linux Kernel
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »