Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.2.20 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0246
The ioperm system call in Linux kernel 2.4.20 and previous versions does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.5.40
Linux Linux Kernel 2.5.21
Linux Linux Kernel 2.5.0
Linux Linux Kernel 2.5.13
Linux Linux Kernel 2.5.47
Linux Linux Kernel 2.5.35
Linux Linux Kernel 2.5.62
Linux Linux Kernel 2.5.51
Linux Linux Kernel 2.5.14
Linux Linux Kernel 2.5.67
Linux Linux Kernel 2.5.24
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.5.64
Linux Linux Kernel 2.5.27
NA
CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows malicious users to cause a denial of service ("kernel oops").
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0248
The mxcsr code in Linux kernel 2.4 allows malicious users to modify CPU state registers via a malformed address.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0244
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote malicious users to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
Linux Linux Kernel 2.4.0
NA
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
4 EDB exploits
NA
CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote malicious users to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
Linux Linux Kernel 2.4.15
Netbsd Netbsd 1.5.3
Microsoft Windows 2000 Terminal Services
Netbsd Netbsd 1.6
Linux Linux Kernel 2.4.11
Netbsd Netbsd 1.5
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Microsoft Windows 2000
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
3 EDB exploits
2 Github repositories
NA
CVE-2002-1976
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow malicious users to sniff the network without detection, as demonstrated using libp...
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.3.0
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
NA
CVE-2002-1380
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.17
1 EDB exploit
NA
CVE-2002-1319
The Linux kernel 2.4.20 and previous versions, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
Linux Linux Kernel 2.4.15
Trustix Secure Linux 1.1
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.16
Trustix Secure Linux 1.5
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.2.19
Trustix Secure Linux 1.2
Linux Linux Kernel 2.2.20
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »