Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.0 vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-1999-0460
Buffer overflow in Linux autofs module through long directory names allows local users to perform a denial of service.
Linux Linux Kernel 2.1
Linux Linux Kernel 2.0
Linux Linux Kernel 2.3.0
1 EDB exploit
2.1
CVSSv2
CVE-1999-0451
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
Linux Linux Kernel 2.0
Linux Linux Kernel 2.2.0
1 EDB exploit
5
CVSSv2
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Redhat Linux 5.2
Linux Linux Kernel 2.0.35
Linux Linux Kernel 2.0.37
Debian Debian Linux 2.1
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
1 EDB exploit
4
CVSSv2
CVE-2014-3940
The Linux kernel up to and including 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition ...
Redhat Enterprise Mrg 2.0
Redhat Enterprise Linux 6.0
Linux Linux Kernel 3.14
Linux Linux Kernel 3.14.3
Linux Linux Kernel 3.14.4
Linux Linux Kernel
Linux Linux Kernel 3.14.1
Linux Linux Kernel 3.14.2
7.2
CVSSv2
CVE-2004-0186
smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
Samba Samba 3.0.0
Samba Samba 2.0
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6 Test9 Cvs
1 EDB exploit
10
CVSSv2
CVE-2000-0506
The "capabilities" feature in Linux prior to 2.2.16 allows local users to cause a denial of service or gain privileges by setting the capabilities to prevent a setuid program from dropping privileges, aka the "Linux kernel setuid/setcap vulnerability."
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.1
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.2.15
Linux Linux Kernel 2.2.16
Linux Linux Kernel 2.0
Linux Linux Kernel 2.2.12
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.2.15 Pre20
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.33
Linux Linux Kernel 2.0.35
2 EDB exploits
7.2
CVSSv2
CVE-1999-0381
super 3.11.6 and other versions have a buffer overflow in the syslog utility which allows a local user to gain root access.
Debian Debian Linux 2.0
Linux Linux Kernel 2.6.20.1
1 EDB exploit
5
CVSSv2
CVE-2003-0418
The Linux 2.0 kernel IP stack does not properly calculate the size of an ICMP citation, which causes it to include portions of unauthorized memory in ICMP error responses.
Linux Linux Kernel 2.0.12
Linux Linux Kernel 2.0.13
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.0.21
Linux Linux Kernel 2.0.28
Linux Linux Kernel 2.0.29
Linux Linux Kernel 2.0.35
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.8
Linux Linux Kernel 2.0.9
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.1
Linux Linux Kernel 2.0.16
Linux Linux Kernel 2.0.17
Linux Linux Kernel 2.0.24
Linux Linux Kernel 2.0.25
Linux Linux Kernel 2.0.31
Linux Linux Kernel 2.0.32
Linux Linux Kernel 2.0.39
Linux Linux Kernel 2.0.4
Linux Linux Kernel 2.0.5
Linux Linux Kernel 2.0.10
6.9
CVSSv2
CVE-2016-3699
The Linux kernel, as used in Red Hat Enterprise Linux 7.2 and Red Hat Enterprise MRG 2 and when booted with UEFI Secure Boot enabled, allows local users to bypass intended Secure Boot restrictions and execute untrusted code by appending ACPI tables to the initrd.
Redhat Linux 7.2
Linux Linux Kernel -
Redhat Enterprise Mrg 2.0
2.1
CVSSv2
CVE-2004-0415
Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory.
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.1
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.6
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.6.4
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »