Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.2.25 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0501
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
Linux Linux Kernel 2.6.20.1
1 EDB exploit
NA
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0(16)sc3
Cisco Ios 12.2(3.4)bp
Cisco Ios 11.2xa
Cisco Ios 12.4(2)t2
Cisco Ios 12.3ym
Cisco Ios 11.3(11b)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0(21)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1(2)e1
Cisco Ios 12.1xg
Cisco Ios 12.1(19)ew
Cisco Ios 12.3(14)ym4
Cisco Ios 12.0(8)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2(7b)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3(10)
1 Github repository
NA
CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows malicious users to cause a denial of service ("kernel oops").
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0248
The mxcsr code in Linux kernel 2.4 allows malicious users to modify CPU state registers via a malformed address.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.2
Redhat Linux 8.0
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.1
NA
CVE-2003-0550
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows malicious users to modify the bridge topology.
Redhat Linux 2.4.2
NA
CVE-2003-0551
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow malicious users to cause a denial of service.
Redhat Linux 2.4.2
NA
CVE-2003-0552
Linux 2.4.x allows remote malicious users to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
Redhat Linux 2.4.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
CVE-2012-1823
memory leak
CVE-2024-0627
CVE-2024-31402
privilege escalation
CVE-2024-36418
remote code execution
CVE-2024-27844
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3