Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.20 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
2.1
CVSSv2
CVE-2003-0476
The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.
Linux Linux Kernel 2.4.0
2.1
CVSSv2
CVE-2003-0501
The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
Linux Linux Kernel 2.6.20.1
1 EDB exploit
2.1
CVSSv2
CVE-2003-0643
Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows malicious users to cause a denial of service (crash).
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.4
2.1
CVSSv2
CVE-2002-1380
Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.2
Linux Linux Kernel 2.2.5
Linux Linux Kernel 2.2.6
Linux Linux Kernel 2.2.7
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.2.8
Linux Linux Kernel 2.2.9
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.2.22
Linux Linux Kernel 2.2.23
Linux Linux Kernel 2.2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.3
1 EDB exploit
2.1
CVSSv2
CVE-2002-1319
The Linux kernel 2.4.20 and previous versions, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs.
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.9
Trustix Secure Linux 1.1
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.20
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.7
1.2
CVSSv2
CVE-2004-0814
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x prior to 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote malicious users to cause a de...
Linux Linux Kernel 2.2.11
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.2.17
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.24
Linux Linux Kernel 2.2.25
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.15 Pre20
1.2
CVSSv2
CVE-2003-0462
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
Mandrakesoft Mandrake Multi Network Firewall 8.2
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.20
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.9
Mandrakesoft Mandrake Linux 8.2
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9