Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.19 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2004-0109
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.5.0
4.6
CVSSv2
CVE-2004-0003
Unknown vulnerability in Linux kernel prior to 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."
Linux Linux Kernel
4.6
CVSSv2
CVE-2003-0984
Real time clock (RTC) routines in Linux kernel 2.4.23 and previous versions do not properly initialize their structures, which could leak kernel data to user space.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.22
4.4
CVSSv2
CVE-2004-2731
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function o...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.33.3
Linux Linux Kernel 2.4.33.4
Linux Linux Kernel 2.4.33.5
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.24 Ow1
3.7
CVSSv2
CVE-2005-1768
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 prior to 2.4.31 and 2.6 prior to 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.24
3.6
CVSSv2
CVE-2003-0246
The ioperm system call in Linux kernel 2.4.20 and previous versions does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.5.13
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.5.11
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.5.2
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.5.27
Linux Linux Kernel 2.5.28
Linux Linux Kernel 2.5.34
Linux Linux Kernel 2.5.35
Linux Linux Kernel 2.5.36
3.6
CVSSv2
CVE-2003-0018
Linux kernel 2.4.10 up to and including 2.4.21-pre4 does not properly handle the O_DIRECT feature, which allows local attackers with write privileges to read portions of previously deleted files, or cause file system corruption.
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
2.6
CVSSv2
CVE-2005-3275
The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 prior to 2.6.13 and 2.4 prior to 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote malicious users to cause a denial of service (memory corruption) by causing two packets...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.8.1.5
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.11 Rc1 Bk6
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.11.6
Linux Linux Kernel 2.6.11.11
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.11.5
2.1
CVSSv2
CVE-2006-2071
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they ...
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.6.12
Linux Linux Kernel 2.6.14
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.33
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.6.13
Linux Linux Kernel 2.6.13.3
Linux Linux Kernel 2.6.11.8
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.14.4
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
2.1
CVSSv2
CVE-2005-2708
The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.31
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.29
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.32
Linux Linux Kernel 2.4.14
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »