Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
syscalls vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2021-41133
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions before 1.10.4 and 1.12.0, Flatpak apps with direct access to AF_UNIX sockets such as those used by Wayland, Pipewire or pipewire-pulse can trick portals and other host...
Flatpak Flatpak
Debian Debian Linux 11.0
Fedoraproject Fedora 33
Fedoraproject Fedora 34
9.8
CVSSv3
CVE-2011-5330
Distributed Ruby (aka DRuby) 1.8 mishandles the sending of syscalls.
Distributed Ruby Project Distributed Ruby 1.8
1 Github repository
9.8
CVSSv3
CVE-2016-5872
In all Qualcomm products with Android releases from CAF using the Linux kernel, arguments to several QTEE syscalls are not properly validated.
Google Android
NA
CVE-2009-0835
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and previous versions on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process ma...
Linux Linux Kernel 2.6.25
Linux Linux Kernel 2.6.25.10
Linux Linux Kernel 2.6.25.3
Linux Linux Kernel 2.6.25.4
Linux Linux Kernel 2.6.25.5
Linux Linux Kernel 2.6.25.6
Linux Linux Kernel 2.6.25.12
Linux Linux Kernel 2.6.25.11
Linux Linux Kernel 2.6.25.9
Linux Linux Kernel 2.6.25.1
Linux Linux Kernel 2.6.25.2
Linux Linux Kernel 2.6.25.7
Linux Linux Kernel 2.6.25.8
1 EDB exploit
7.8
CVSSv3
CVE-2020-10028
Multiple syscalls with insufficient argument validation See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions.
Zephyrproject Zephyr 1.14.0
Zephyrproject Zephyr 2.1.0
7.8
CVSSv3
CVE-2020-10058
Multiple syscalls in the Kscan subsystem perform insufficient argument validation, allowing code executing in userspace to potentially gain elevated privileges. See NCC-ZEP-006 This issue affects: zephyrproject-rtos zephyr version 2.1.0 and later versions.
Zephyrproject Zephyr 2.1.0
NA
CVE-2005-0091
Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
NA
CVE-2004-1323
Multiple syscalls in the compat subsystem for NetBSD prior to 2.0 allow local users to cause a denial of service (kernel crash) via a large signal number to (1) xxx_sys_kill, (2) xxx_sys_sigaction, and possibly other translation functions.
Netbsd Netbsd 1.5.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Netbsd Netbsd 1.5
Netbsd Netbsd 1.6.1
Netbsd Netbsd 1.6.2
7.8
CVSSv3
CVE-2019-20172
Kernel/VM/MemoryManager.cpp in SerenityOS prior to 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
Serenityos Serenityos
NA
CVE-2005-0136
The Linux kernel prior to 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.10
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »