Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2004-0887
SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.9
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.7
Suse Suse Linux 9.0
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
7.2
CVSSv2
CVE-2004-1151
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local malicious users to modify kernel memory and gain privileges.
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.1
Ubuntu Ubuntu Linux 4.1
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.8
Linux Linux Kernel 2.6.10
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.9
7.2
CVSSv2
CVE-2004-1070
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 2.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Redhat Fedora Core Core 3.0
7.2
CVSSv2
CVE-2004-1071
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Fedora Core Core 3.0
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 9.0
Suse Suse Linux 9.1
Linux Linux Kernel 2.4.15
7.2
CVSSv2
CVE-2004-1072
The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to caus...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.6.8
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
Suse Suse Linux 1.0
Suse Suse Linux 9.1
Suse Suse Linux 9.2
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.2
7.2
CVSSv2
CVE-2004-0495
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
Avaya Converged Communications Server 2.0
Avaya Modular Messaging Message Storage Server S3400
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.7
Suse Suse Linux 7
Suse Suse Linux 8.0
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Suse Suse Linux 8.2
Suse Suse Linux 8
Suse Suse Linux 9.0
Gentoo Linux 1.4
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.6
7.2
CVSSv2
CVE-2004-0658
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_con...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.5.13
Linux Linux Kernel 2.5.2
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.5.28
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.5.35
Linux Linux Kernel 2.5.36
Linux Linux Kernel 2.5.42
Linux Linux Kernel 2.5.43
Linux Linux Kernel 2.5.50
Linux Linux Kernel 2.4.1
7.2
CVSSv2
CVE-2004-0424
Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 up to and including 2.4.25 and 2.6.1 up to and including 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option.
Sgi Propack 3.0
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.6.3
Slackware Slackware Linux 9.1
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.6.2
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.25
Slackware Slackware Linux Current
1 EDB exploit
7.2
CVSSv2
CVE-2004-0186
smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
Samba Samba 3.0.0
Samba Samba 2.0
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6 Test9 Cvs
1 EDB exploit
7.2
CVSSv2
CVE-2004-0077
The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges...
Redhat Kernel 2.4.20-8
Redhat Kernel Doc 2.4.20-8
Redhat Bigmem Kernel 2.4.20-8
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »