Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.2 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2005-0839
Linux kernel 2.6 prior to 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.8.1
Linux Linux Kernel 2.6.6
641
VMScore
CVE-2004-0887
SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.
Suse Suse Linux 9.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
641
VMScore
CVE-2004-1151
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local malicious users to modify kernel memory and gain privileges.
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
641
VMScore
CVE-2004-1070
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program...
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Redhat Linux Advanced Workstation 2.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Linux Linux Kernel 2.4.19
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
641
VMScore
CVE-2004-1071
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Redhat Linux Advanced Workstation 2.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Linux Linux Kernel 2.4.19
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
641
VMScore
CVE-2004-1072
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to caus...
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Trustix Secure Linux 2.0
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Redhat Linux Advanced Workstation 2.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Linux Linux Kernel 2.4.19
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
641
VMScore
CVE-2004-0495
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 2.1
Suse Suse Linux 8
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.6.2
Avaya Modular Messaging Message Storage Server S3400
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.24
Avaya Converged Communications Server 2.0
Suse Suse Linux 8.0
Linux Linux Kernel 2.6.0
Suse Suse Linux 7
Linux Linux Kernel 2.4.19
641
VMScore
CVE-2004-0658
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_con...
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.5.54
Linux Linux Kernel 2.5.68
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.5.40
Linux Linux Kernel 2.5.21
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.5.0
Linux Linux Kernel 2.5.13
Linux Linux Kernel 2.5.47
Linux Linux Kernel 2.5.35
Linux Linux Kernel 2.5.62
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.5.51
Linux Linux Kernel 2.5.14
635
VMScore
CVE-2004-1235
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 up to and including 2.429-rc2 and 2.6 up to and including 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.
Suse Suse Linux 9.0
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Mandrakesoft Mandrake Linux Corporate Server 2.1
Suse Suse Linux 9.2
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.4.26
Suse Suse Linux 8.2
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
3 EDB exploits
633
VMScore
CVE-2009-4027
Race condition in the mac80211 subsystem in the Linux kernel prior to 2.6.32-rc8-next-20091201 allows remote malicious users to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation...
Linux Linux Kernel 2.6.27.29
Linux Linux Kernel 2.6.27.12
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.27.3
Linux Linux Kernel 2.6.31
Linux Linux Kernel 2.6.29.3
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.32
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.27.1
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.15.3
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »