Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux_kernel vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-20676
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07628518.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20677
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588436.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20682
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441605; Issue ID: ALPS07441605.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20661
In wlan, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07560782; Issue ID: ALPS07560782.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20675
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588569; Issue ID: ALPS07588569.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-20679
In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588413; Issue ID: ALPS07588453.
Google Android 11.0
Google Android 12.0
Google Android 13.0
Yoctoproject Yocto 3.1
Yoctoproject Yocto 3.3
Yoctoproject Yocto 4.0
Linux Linux Kernel 4.19
NA
CVE-2023-32820
In wlan firmware, there is a possible firmware assertion due to improper input handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07932637; Issue ID: ALPS07932637.
Linuxfoundation Yocto 3.1
Linuxfoundation Yocto 3.3
Mediatek Iot Yocto 23.0
Google Android 11.0
Google Android 12.0
Google Android 13.0
Linux Linux Kernel 4.19
694
VMScore
CVE-2009-4272
A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote malicious users to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing "...
Linux Linux Kernel 2.6.18
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.4
Redhat Virtualization 5.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6