Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.0 vulnerabilities and exploits
(subscribe to this query)
6.9
CVSSv2
CVE-2011-2022
The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel prior to 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl io...
Linux Linux Kernel
Redhat Enterprise Linux Server 5.0
Redhat Enterprise Linux Workstation 5.0
Redhat Enterprise Linux 5.0
Redhat Enterprise Linux Desktop 5.0
Redhat Enterprise Linux Eus 5.6
Redhat Enterprise Linux Aus 5.6
6.9
CVSSv2
CVE-2011-1494
Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and previous versions might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value tha...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.32.5
Linux Linux Kernel 2.6.28
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.35
Linux Linux Kernel 2.6.17
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.26
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.33.7
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.20
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
6.7
CVSSv2
CVE-2018-16884
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host ker...
Linux Linux Kernel
Redhat Enterprise Linux 7.0
Redhat Enterprise Mrg 2.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
6.4
CVSSv2
CVE-2005-0815
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and previous versions may allow malicious users to cause a denial of service or corrupt memory via a crafted filesystem.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.5.40
Linux Linux Kernel 2.5.21
1 EDB exploit
6.4
CVSSv2
CVE-2004-0949
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to ...
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Ubuntu Ubuntu Linux 4.1
Redhat Linux Advanced Workstation 2.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
6.4
CVSSv2
CVE-2004-0883
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read fun...
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Ubuntu Ubuntu Linux 4.1
Redhat Linux Advanced Workstation 2.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Linux Linux Kernel 2.4.19
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
6.2
CVSSv2
CVE-2013-1773
Buffer overflow in the VFAT filesystem implementation in the Linux kernel prior to 3.3 allows local users to gain privileges or cause a denial of service (system crash) via a VFAT write operation on a filesystem with the utf8 mount option, which is not properly handled during UTF...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.0.5
Linux Linux Kernel
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.2.26
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
Linux Linux Kernel 3.0.32
1 EDB exploit
6.2
CVSSv2
CVE-2011-1759
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel prior to 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by pr...
Linux Linux Kernel 2.6.38
Linux Linux Kernel 2.6.38.3
Linux Linux Kernel
Linux Linux Kernel 2.6.38.6
Linux Linux Kernel 2.6.38.1
Linux Linux Kernel 2.6.38.5
Linux Linux Kernel 2.6.38.2
Linux Linux Kernel 2.6.38.4
Linux Linux Kernel 2.6.38.7
6.2
CVSSv2
CVE-2004-1235
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 up to and including 2.429-rc2 and 2.6 up to and including 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
3 EDB exploits
6.2
CVSSv2
CVE-2005-0178
Race condition in the setsid function in Linux prior to 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Vserver Linux-vserver 1.24
Vserver Linux-vserver 1.21
Netkit Linux Netkit 0.17
Vserver Linux-vserver 1.22
Vserver Linux-vserver 1.20
Vserver Linux-vserver 1.23
Netkit Linux Netkit 0.17.17
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »