Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.0.34 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0314
traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.
Debian Debian Linux 2.0.34
Digital Unix 4.0
Redhat Linux 2.0.34
Slackware Slackware Linux 2.0.34
Netbsd Netbsd
5
CVSSv2
CVE-2000-0315
traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.
Redhat Linux 2.0.34
Slackware Slackware Linux 2.0.34
Netbsd Netbsd
Debian Debian Linux 2.0.34
Digital Unix 4.0
5
CVSSv2
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Redhat Linux 5.2
Linux Linux Kernel 2.0.35
Linux Linux Kernel 2.0.37
Debian Debian Linux 2.1
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
1 EDB exploit
7.5
CVSSv2
CVE-2007-0455
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
Gd Graphics Library Project Gd Graphics Library
Php Php
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 13
Fedoraproject Fedora 14
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
6.9
CVSSv2
CVE-2011-1011
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and previous versions in Red Hat Enterprise Linux (RHEL) 6 and previous versions, and Fedora 14 and previous versions, mounts a new directory on top of /tmp with...
Redhat Policycoreutils
Redhat Policycoreutils 1.0
Redhat Policycoreutils 1.1
Redhat Policycoreutils 1.2
Redhat Policycoreutils 1.4
Redhat Policycoreutils 1.6
Redhat Policycoreutils 1.8
Redhat Policycoreutils 1.10
Redhat Policycoreutils 1.12
Redhat Policycoreutils 1.14
Redhat Policycoreutils 1.16
Redhat Policycoreutils 1.18
Redhat Policycoreutils 1.20
Redhat Policycoreutils 1.21.1
Redhat Policycoreutils 1.21.2
Redhat Policycoreutils 1.21.3
Redhat Policycoreutils 1.21.4
Redhat Policycoreutils 1.21.5
Redhat Policycoreutils 1.21.6
Redhat Policycoreutils 1.21.7
Redhat Policycoreutils 1.21.8
Redhat Policycoreutils 1.21.9
7.2
CVSSv2
CVE-2004-1057
Multiple drivers in Linux kernel 2.4.19 and previous versions do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
Linux Linux Kernel 2.0.14
Linux Linux Kernel 2.0.15
Linux Linux Kernel 2.0.22
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.3
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.1
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.27
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.3.0
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.18
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started