Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.4.21 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2003-0461
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
Redhat Linux 7.1
Redhat Linux 7.2
Redhat Linux 9.0
Redhat Linux 7.3
Redhat Linux 8.0
436
VMScore
CVE-2007-5001
Linux kernel prior to 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux As 3
Redhat Enterprise Linux Es 3
Redhat Enterprise Linux Ws 3
187
VMScore
CVE-2004-0491
The linux-2.4.21-mlock.patch in Red Hat Enterprise Linux 3 does not properly maintain the mlock page count when one process unlocks pages that belong to another process, which allows local users to mlock more memory than specified by the rlimit.
Redhat Enterprise Linux 3.0
694
VMScore
CVE-2007-6694
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 up to and including 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property function to fail, which triggers a NULL poi...
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.24 Ow1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.28
Linux Linux Kernel 2.4.30
Linux Linux Kernel 2.4.33.2
Linux Linux Kernel 2.4.33.3
Linux Linux Kernel 2.4.35
Linux Linux Kernel 2.4.35.2
Linux Linux Kernel 2.4.9 Pre5
Linux Linux Kernel 2.5.0
Linux Linux Kernel 2.5.15
Linux Linux Kernel 2.5.16
Linux Linux Kernel 2.5.23
Linux Linux Kernel 2.5.24
Linux Linux Kernel 2.5.30
Linux Linux Kernel 2.5.31
Linux Linux Kernel 2.5.38
Linux Linux Kernel 2.5.39
Linux Linux Kernel 2.5.46
Linux Linux Kernel 2.5.47
445
VMScore
CVE-2003-0550
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows malicious users to modify the bridge topology.
Redhat Linux 2.4.2
445
VMScore
CVE-2003-0551
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow malicious users to cause a denial of service.
Redhat Linux 2.4.2
445
VMScore
CVE-2003-0552
Linux 2.4.x allows remote malicious users to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
Redhat Linux 2.4.2
890
VMScore
CVE-2003-0959
Multiple integer overflows in the 32bit emulation for AMD64 architectures in Linux 2.4 kernel prior to 2.4.21 allows malicious users to cause a denial of service or gain root privileges via unspecified vectors that trigger copy_from_user function calls with improper length argume...
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9