Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.20 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2003-0364
The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote malicious users to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.
Redhat Linux 7.2
Redhat Linux 7.3
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
5
CVSSv2
CVE-2003-0247
Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows malicious users to cause a denial of service ("kernel oops").
Redhat Linux 7.1
Redhat Linux 8.0
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 7.3
5
CVSSv2
CVE-2003-0244
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote malicious users to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
Linux Linux Kernel 2.4.0
5
CVSSv2
CVE-2003-0001
Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote malicious users to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.
Linux Linux Kernel 2.4.1
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Microsoft Windows 2000
Microsoft Windows 2000 Terminal Services
Netbsd Netbsd 1.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.9
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
3 EDB exploits
2 Github repositories
4.9
CVSSv2
CVE-2005-4881
The netlink subsystem in the Linux kernel 2.4.x prior to 2.4.37.6 and 2.6.x prior to 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) t...
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.35.2
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.34.6
Linux Linux Kernel 2.4.37.2
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.36.6
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.37.4
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.36.2
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.33.2
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.35.1
Linux Linux Kernel 2.4.33.1
Linux Linux Kernel 2.4.36.1
Linux Linux Kernel 2.4.7
4.9
CVSSv2
CVE-2006-3741
The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 prior to 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.16.6
4.9
CVSSv2
CVE-2005-0489
The /proc handling (proc/base.c) Linux kernel 2.4 prior to 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.26
4.9
CVSSv2
CVE-2005-3660
Linux kernel 2.4 and 2.6 allows malicious users to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfe...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.5.11
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.5.19
Linux Linux Kernel 2.5.2
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.5.27
Linux Linux Kernel 2.5.28
Linux Linux Kernel 2.5.34
Linux Linux Kernel 2.5.35
4.9
CVSSv2
CVE-2004-0138
The ELF loader in Linux kernel 2.4 prior to 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
4.6
CVSSv2
CVE-2006-4814
The mincore function in the Linux kernel prior to 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.31
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.30
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »