Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.1 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Linux Linux Kernel 2.4.0
Trustix Secure Linux 2.1
187
VMScore
CVE-2004-0587
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service.
Mandrakesoft Mandrake Linux Corporate Server 2.1
Redhat Fedora Core Core 1.0
Suse Suse Linux 8.1
Mandrakesoft Mandrake Linux 10.0
Suse Suse Linux 8
Suse Suse Linux 9.0
Mandrakesoft Mandrake Linux 9.2
187
VMScore
CVE-2004-0535
The e1000 driver for Linux kernel 2.4.26 and previous versions does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.
Suse Suse Email Server 3.1
Suse Suse Email Server Iii
Suse Suse Office Server
Conectiva Linux 8.0
Mandrakesoft Mandrake Multi Network Firewall 8.2
Suse Suse Linux Firewall Live-cd
Suse Suse Linux Office Server
Suse Suse Linux Admin-cd For Firewall
Suse Suse Linux Connectivity Server
Conectiva Linux 9.0
Engardelinux Secure Community 2.0
Suse Suse Linux Database Server
Suse Suse Linux Firewall Cd
Engardelinux Secure Linux 1.5
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.27
151
VMScore
CVE-2006-6655
The procfs implementation in NetBSD-current prior to 20061023, NetBSD 3.0 and 3.0.1 prior to 20061024, and NetBSD 2.x prior to 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was m...
Netbsd Netbsd 3.0
Netbsd Netbsd 3.0.1
Netbsd Netbsd 2.0
Netbsd Netbsd 2.1
125
VMScore
CVE-2003-0462
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
Mandrakesoft Mandrake Multi Network Firewall 8.2
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.9
Mandrakesoft Mandrake Linux 8.2
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6