Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
paul starzetz vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
NA
CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote malicious users to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
Linux Linux Kernel 2.4.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Netbsd Netbsd 1.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.9
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
3 EDB exploits
2 Github repositories
NA
CVE-2005-0001
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultan...
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
NA
CVE-2001-1055
The Microsoft Windows network stack allows remote malicious users to cause a denial of service (CPU consumption) via a flood of malformed ARP request packets with random source IP and MAC addresses, as demonstrated by ARPNuke.
Microsoft Windows 98se
Microsoft Windows 98
1 EDB exploit
NA
CVE-2005-1263
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative le...
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.31
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.27
1 EDB exploit
NA
CVE-2001-0610
kfm as included with KDE 1.x can allow a local malicious user to gain additional privileges via a symlink attack in the kfm cache directory in /tmp.
Suse Suse Linux 7.0
Kde Kde 1.x
1 EDB exploit
NA
CVE-2004-1137
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote malicious users to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the ...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
1 EDB exploit
NA
CVE-2004-0415
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
1 EDB exploit
NA
CVE-2004-1016
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.7
1 EDB exploit
NA
CVE-2004-1073
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »