Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.0.37 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-1999-0426
The default permissions of /dev/kmem in Linux versions prior to 2.0.36 allows IP spoofing.
Suse Suse Linux 6.0
1 EDB exploit
1 Github repository
NA
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0(16)sc3
Cisco Ios 12.2(3.4)bp
Cisco Ios 11.2xa
Cisco Ios 12.4(2)t2
Cisco Ios 12.3ym
Cisco Ios 11.3(11b)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0(21)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1(2)e1
Cisco Ios 12.1xg
Cisco Ios 12.1(19)ew
Cisco Ios 12.3(14)ym4
Cisco Ios 12.0(8)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2(7b)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3(10)
1 Github repository
NA
CVE-2005-0815
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and previous versions may allow malicious users to cause a denial of service or corrupt memory via a crafted filesystem.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.5.40
Linux Linux Kernel 2.5.21
1 EDB exploit
NA
CVE-2005-0749
The load_elf_library in the Linux kernel prior to 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.5.40
NA
CVE-2005-0178
Race condition in the setsid function in Linux prior to 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Vserver Linux-vserver 1.24
Vserver Linux-vserver 1.21
Netkit Linux Netkit 0.17
Vserver Linux-vserver 1.22
Vserver Linux-vserver 1.20
Vserver Linux-vserver 1.23
Netkit Linux Netkit 0.17.17
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
NA
CVE-2004-1057
Multiple drivers in Linux kernel 2.4.19 and previous versions do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.4.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.0.31
Linux Linux Kernel 2.0.24
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.0.9
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Redhat Enterprise Linux 3.0
NA
CVE-2003-0418
The Linux 2.0 kernel IP stack does not properly calculate the size of an ICMP citation, which causes it to include portions of unauthorized memory in ICMP error responses.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.0.31
Linux Linux Kernel 2.0.24
Linux Linux Kernel 2.0.9
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.14
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0.11
Linux Linux Kernel 2.0.15
Linux Linux Kernel 2.0.4
Linux Linux Kernel 2.0.6
Linux Linux Kernel 2.0.5
Linux Linux Kernel 2.0.21
Linux Linux Kernel 2.0.26
Linux Linux Kernel 2.0.28
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.39
Linux Linux Kernel 2.0.29
NA
CVE-2000-0506
The "capabilities" feature in Linux prior to 2.2.16 allows local users to cause a denial of service or gain privileges by setting the capabilities to prevent a setuid program from dropping privileges, aka the "Linux kernel setuid/setcap vulnerability."
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.1
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.0
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.2.15 Pre20
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.33
Linux Linux Kernel 2.0.35
2 EDB exploits
NA
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Debian Debian Linux 2.1
Redhat Linux 5.2
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.35
1 EDB exploit
NA
CVE-1999-1166
Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory.
Linux Linux Kernel 2.0.37
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »