Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vasiliy kulikov vulnerabilities and exploits
(subscribe to this query)
740
VMScore
CVE-2011-2497
Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel prior to 3.0 allows remote malicious users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within th...
Linux Linux Kernel
739
VMScore
CVE-2011-3191
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel prior to 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read reque...
Linux Linux Kernel
Redhat Enterprise Linux 4.0
725
VMScore
CVE-2009-4067
Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel prior to 2.6.27 allows physically proximate malicious users to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.
Linux Linux Kernel
Redhat Enterprise Linux 4.0
1 EDB exploit
695
VMScore
CVE-2011-1093
The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel prior to 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote malicious users to cause a denial of service (...
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
695
VMScore
CVE-2011-1770
Integer underflow in the dccp_parse_options function (net/dccp/options.c) in the Linux kernel prior to 2.6.33.14 allows remote malicious users to cause a denial of service via a Datagram Congestion Control Protocol (DCCP) packet with an invalid feature options length, which trigg...
Linux Linux Kernel
Fedoraproject Fedora 15
Fedoraproject Fedora 14
670
VMScore
CVE-2011-1493
Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel prior to 2.6.39 allows remote malicious users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data tha...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
668
VMScore
CVE-2011-3601
Buffer overflow in the process_ra function in the router advertisement daemon (radvd) prior to 1.8.2 allows remote malicious users to execute arbitrary code or cause a denial of service (crash) via a negative value in a label_len value.
Litech Router Advertisement Daemon
668
VMScore
CVE-2011-3604
The process_ra function in the router advertisement daemon (radvd) prior to 1.8.2 allows remote malicious users to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors.
Litech Router Advertisement Daemon
668
VMScore
CVE-2011-1180
Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel prior to 2.6.39 allow remote malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging con...
Linux Linux Kernel
642
VMScore
CVE-2011-1477
Multiple array index errors in sound/oss/opl3.c in the Linux kernel prior to 2.6.39 allow local users to cause a denial of service (heap memory corruption) or possibly gain privileges by leveraging write access to /dev/sequencer.
Linux Linux Kernel
Suse Linux Enterprise Desktop 10
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »