Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
kevin cernekee vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv3
CVE-2017-17807
The KEYS subsystem in the Linux kernel prior to 4.14.6 omitted an access-control check when adding a key to the current task's "default request-key keyring" via the request_key() system call, allowing a local user to use a sequence of crafted system calls to add ke...
Linux Linux Kernel
7.8
CVSSv3
CVE-2017-17450
net/netfilter/xt_osf.c in the Linux kernel up to and including 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared...
Linux Linux Kernel
6.6
CVSSv3
CVE-2017-16644
The hdpvr_probe function in drivers/media/usb/hdpvr/hdpvr-core.c in the Linux kernel up to and including 4.13.11 allows local users to cause a denial of service (improper error handling and system crash) or possibly have unspecified other impact via a crafted USB device.
Linux Linux Kernel
6.6
CVSSv3
CVE-2017-16538
drivers/media/usb/dvb-usb-v2/lmedm04.c in the Linux kernel up to and including 4.13.11 allows local users to cause a denial of service (general protection fault and system crash) or possibly have unspecified other impact via a crafted USB device, related to a missing warm-start c...
Linux Linux Kernel
NA
CVE-2013-6769
The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android allows malicious users to gain privileges via shell metacharacters in the -c option to /system/xbin/su.
Koushik Dutta Superuser 1.0.2.1
NA
CVE-2013-6768
Untrusted search path vulnerability in the CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and previous versions allows malicious users to trigger the launch of a Trojan horse app_process program via a crafted PATH environment variable for a /system/xbi...
Koushik Dutta Superuser 1.0.2.1
NA
CVE-2013-6770
The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows malicious users to gain privileges by leveraging ADB shell access and a certain ...
Koushik Dutta Superuser 1.0.2.1
Google Android 4.4
NA
CVE-2013-6774
Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and previous versions, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and previous versions, and Chainfire SuperSU package prior to 1.69 for Android 4.2.x and...
Chainfire Supersu 1.69
Androidsu Chainsdd Superuser 3.1.3
Koushik Dutta Superuser 1.0.2.1
NA
CVE-2013-6775
The Chainfire SuperSU package prior to 1.69 for Android allows malicious users to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.
Chainfire Supersu 1.69
NA
CVE-2012-6128
Multiple stack-based buffer overflows in http.c in OpenConnect prior to 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
Infradead Openconnect 3.16
Infradead Openconnect 3.15
Infradead Openconnect 3.00
Infradead Openconnect 2.26
Infradead Openconnect 2.12
Infradead Openconnect 2.11
Infradead Openconnect 1.00
Infradead Openconnect 3.17
Infradead Openconnect 4.02
Infradead Openconnect 3.02
Infradead Openconnect 3.01
Infradead Openconnect 2.21
Infradead Openconnect 2.20
Infradead Openconnect 1.20
Infradead Openconnect 1.10
Infradead Openconnect 4.00
Infradead Openconnect 4.01
Infradead Openconnect 3.14
Infradead Openconnect 3.13
Infradead Openconnect 2.25
Infradead Openconnect 2.24
Infradead Openconnect 2.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started