Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.18 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1017
Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.
Linux Linux Kernel 2.4.0
NA
CVE-2004-1234
load_elf_binary in Linux prior to 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.9
Linux Linux Kernel
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
NA
CVE-2004-2607
A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.6.2
NA
CVE-2004-2731
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function o...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.33.3
Linux Linux Kernel 2.4.33.4
Linux Linux Kernel 2.4.33.5
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.24 Ow1
NA
CVE-2004-0685
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.15 Pre20
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
NA
CVE-2004-0814
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x prior to 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote malicious users to cause a de...
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.25
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.15 Pre20
NA
CVE-2004-1333
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 prior to 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Fedora Core Core 2.0
Redhat Linux 7.3
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.23
1 EDB exploit
NA
CVE-2004-1335
Memory leak in the ip_options_get function in the Linux kernel prior to 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Fedora Core Core 2.0
Redhat Linux 7.3
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.23
1 EDB exploit
NA
CVE-2004-0565
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Mandrakesoft Mandrake Multi Network Firewall 8.2
Mandrakesoft Mandrake Linux 10.0
Trustix Secure Linux 2
Trustix Secure Linux 2.0
Mandrakesoft Mandrake Linux 9.2
Mandrakesoft Mandrake Linux Corporate Server 2.1
Mandrakesoft Mandrake Linux 9.1
Gentoo Linux
Linux Linux Kernel 2.4.0
Trustix Secure Linux 2.1
NA
CVE-2004-0415
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »