Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux_kernel vulnerabilities and exploits
(subscribe to this query)
436
VMScore
CVE-2022-20107
In subtitle service, there is a possible application crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330673; Issue ID: DTV03330673.
Google Android 9.0
Google Android 10.0
Google Android 11.0
Linux Linux Kernel 4.9
Linux Linux Kernel 4.19
436
VMScore
CVE-2020-8834
KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc_{save,restore}_tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can caus...
Linux Linux Kernel -
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 18.04
Opensuse Leap 15.1
436
VMScore
CVE-2010-4161
The udp_queue_rcv_skb function in net/ipv4/udp.c in a certain Red Hat build of the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows malicious users to cause a denial of service (deadlock and system hang) by sending UDP traffic to a socket that has a crafted socket ...
Linux Linux Kernel 2.6.18
Redhat Enterprise Linux 5
436
VMScore
CVE-2010-2938
arch/x86/hvm/vmx/vmcs.c in the virtual-machine control structure (VMCS) implementation in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when an Intel platform without Extended Page Tables (EPT) functionality is used, accesses VMCS fields without verifying hardware...
Linux Linux Kernel 2.6.18
436
VMScore
CVE-2008-5395
The parisc_show_stack function in arch/parisc/kernel/traps.c in the Linux kernel prior to 2.6.28-rc7 on PA-RISC allows local users to cause a denial of service (system crash) via vectors associated with an attempt to unwind a stack that contains userspace addresses.
Linux Linux Kernel
Linux Linux Kernel 2.2.27
Linux Linux Kernel 2.4.36
Linux Linux Kernel 2.4.36.1
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.4.36.3
Linux Linux Kernel 2.4.36.4
Linux Linux Kernel 2.4.36.5
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.6
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.19.4
Linux Linux Kernel 2.6.19.5
Linux Linux Kernel 2.6.19.6
Linux Linux Kernel 2.6.19.7
Linux Linux Kernel 2.6.20.16
Linux Linux Kernel 2.6.20.17
Linux Linux Kernel 2.6.20.18
Linux Linux Kernel 2.6.20.19
Linux Linux Kernel 2.6.20.20
Linux Linux Kernel 2.6.20.21
Linux Linux Kernel 2.6.21.5
436
VMScore
CVE-2007-3104
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
Linux Linux Kernel 2.6.0
436
VMScore
CVE-2006-2932
A regression error in the restore_all code path of the 4/4GB split support for non-hugemem Linux kernels on Red Hat Linux Desktop and Enterprise Linux 4 allows local users to cause a denial of service (panic) via unspecified vectors.
Linux Linux Kernel -
418
VMScore
CVE-2008-3831
The i915 driver in (1) drivers/char/drm/i915_dma.c in the Linux kernel 2.6.24 on Debian GNU/Linux and (2) sys/dev/pci/drm/i915_drv.c in OpenBSD does not restrict the DRM_I915_HWS_ADDR ioctl to the Direct Rendering Manager (DRM) master, which allows local users to cause a denial o...
Linux Linux Kernel 2.6.24
409
VMScore
CVE-2022-20105
In MM service, there is a possible out of bounds write due to a stack-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.
Google Android 9.0
Google Android 10.0
Google Android 11.0
Linux Linux Kernel 4.9
Linux Linux Kernel 4.19
409
VMScore
CVE-2022-20106
In MM service, there is a possible out of bounds write due to a heap-based buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: DTV03330460; Issue ID: DTV03330460.
Google Android 9.0
Google Android 10.0
Google Android 11.0
Linux Linux Kernel 4.9
Linux Linux Kernel 4.19
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »