Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0244
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote malicious users to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
Linux Linux Kernel 2.4.0
NA
CVE-2003-0127
The kernel module loader in Linux kernel 2.2.x prior to 2.2.25, and 2.4.x prior to 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.11
4 EDB exploits
NA
CVE-2002-1976
ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow malicious users to sniff the network without detection, as demonstrated using libp...
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.6
NA
CVE-2002-2254
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network tr...
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.5.13
Linux Linux Kernel 2.5.14
Linux Linux Kernel 2.5.21
Linux Linux Kernel 2.5.22
Linux Linux Kernel 2.5.29
Linux Linux Kernel 2.5.3
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.5.11
Linux Linux Kernel 2.5.12
Linux Linux Kernel 2.5.2
Linux Linux Kernel 2.5.20
Linux Linux Kernel 2.5.27
Linux Linux Kernel 2.5.28
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
NA
CVE-2002-1571
The linux 2.4 kernel prior to 2.4.19 assumes that the fninit instruction clears all registers, which could lead to an information leak on processors that do not clear all relevant SSE registers.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.6
NA
CVE-2002-1573
Unspecified vulnerability in the pcilynx ieee1394 firewire driver (pcilynx.c) in Linux kernel prior to 2.4.20 has unknown impact and attack vectors, related to "wrap handling."
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.6
NA
CVE-2002-1572
Signed integer overflow in the bttv_read function in the bttv driver (bttv-driver.c) in Linux kernel prior to 2.4.20 has unknown impact and attack vectors.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.6
NA
CVE-2002-0499
The d_path function in Linux kernel 2.2.20 and previous versions, and 2.4.18 and previous versions, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories.
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.2.4
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
1 EDB exploit
NA
CVE-2002-0510
The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote malicious users to determine that a target system is running Linux.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.5
NA
CVE-2002-0570
The encrypted loop device in Linux kernel 2.4.10 and previous versions does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.4
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.2.14
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »