Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.2.18 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-0317
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.4.0
2 EDB exploits
NA
CVE-2002-1380
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.17
1 EDB exploit
NA
CVE-2001-1384
ptrace in Linux 2.2.x up to and including 2.2.19, and 2.4.x up to and including 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.4.3
1 EDB exploit
NA
CVE-2002-1319
The Linux kernel 2.4.20 and previous versions, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
Linux Linux Kernel 2.4.15
Trustix Secure Linux 1.1
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.16
Trustix Secure Linux 1.5
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.2.19
Trustix Secure Linux 1.2
Linux Linux Kernel 2.2.20
NA
CVE-2002-0570
The encrypted loop device in Linux kernel 2.4.10 and previous versions does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.0
NA
CVE-2002-1976
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow malicious users to sniff the network without detection, as demonstrated using libp...
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.3.0
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
NA
CVE-2002-0499
The d_path function in Linux kernel 2.2.20 and previous versions, and 2.4.18 and previous versions, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.3.0
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.12
1 EDB exploit
NA
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
4 EDB exploits
NA
CVE-2004-0077
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges...
Redhat Kernel Doc 2.4.20-8
Redhat Kernel 2.4.20-8
Redhat Bigmem Kernel 2.4.20-8
Redhat Kernel Source 2.4.20-8
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.15 Pre20
Linux Linux Kernel 2.2.16
2 EDB exploits
NA
CVE-2005-1263
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative le...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.2.18
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »