Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.33 vulnerabilities and exploits
(subscribe to this query)
409
VMScore
CVE-2008-1940
The RBAC functionality in grsecurity prior to 2.1.11-2.6.24.5 and 2.1.11-2.4.36.2 does not enforce user_transition_deny and user_transition_allow rules for the (1) sys_setfsuid and (2) sys_setfsgid calls, which allows local users to bypass restrictions for those calls.
Grsecurity Grsecurity Kernel Patch 2.4.33.2
Grsecurity Grsecurity Kernel Patch 2.6.18
Grsecurity Grsecurity Kernel Patch 2.4.33.4
Grsecurity Grsecurity Kernel Patch 2.4.33
Grsecurity Grsecurity Kernel Patch 2.4.33.3
Grsecurity Grsecurity Kernel Patch 2.6.24.4
Grsecurity Grsecurity Kernel Patch 2.4.34
409
VMScore
CVE-2006-4814
The mincore function in the Linux kernel prior to 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
Linux Linux Kernel
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.33.2
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.24
392
VMScore
CVE-2004-2731
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function o...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.35.2
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.9 Pre5
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.4.33.2
Linux Linux Kernel 2.4.23 Ow2
365
VMScore
CVE-2006-5871
smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x prior to 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.4.33
187
VMScore
CVE-2006-2071
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they ...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2