Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.18 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2005-0135
The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).
Linux Linux Kernel 2.6.0
5
CVSSv2
CVE-2003-0244
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote malicious users to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
Linux Linux Kernel 2.4.0
10
CVSSv2
CVE-2004-1017
Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.
Linux Linux Kernel 2.4.0
7.5
CVSSv2
CVE-2002-0060
IRC connection tracking helper module in the netfilter subsystem for Linux 2.4.18-pre9 and previous versions does not properly set the mask for conntrack expectations for incoming DCC connections, which could allow remote malicious users to bypass intended firewall restrictions.
Linux Linux Kernel
4.6
CVSSv2
CVE-2004-0003
Unknown vulnerability in Linux kernel prior to 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."
Linux Linux Kernel
2.1
CVSSv2
CVE-2004-0178
The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x prior to 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes.
Linux Linux Kernel 2.4.0
5
CVSSv2
CVE-2004-0177
The ext3 code in Linux 2.4.x prior to 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by re...
Linux Linux Kernel 2.4.0
2.1
CVSSv2
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Linux Linux Kernel 2.4.0
Trustix Secure Linux 2.1
7.2
CVSSv2
CVE-2004-0077
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges...
Redhat Kernel 2.4.20-8
Redhat Kernel Doc 2.4.20-8
Redhat Bigmem Kernel 2.4.20-8
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
2 EDB exploits
2.1
CVSSv2
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »