Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.0.34 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2000-0315
traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.
Redhat Linux 2.0.34
Slackware Slackware Linux 2.0.34
Netbsd Netbsd
Debian Debian Linux 2.0.34
Digital Unix 4.0
445
VMScore
CVE-2000-0314
traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.
Debian Debian Linux 2.0.34
Digital Unix 4.0
Redhat Linux 2.0.34
Slackware Slackware Linux 2.0.34
Netbsd Netbsd
505
VMScore
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Redhat Linux 5.2
Linux Linux Kernel 2.0.35
Linux Linux Kernel 2.0.37
Debian Debian Linux 2.1
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
1 EDB exploit
668
VMScore
CVE-2007-0455
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
Gd Graphics Library Project Gd Graphics Library
Php Php
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 13
Fedoraproject Fedora 14
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
614
VMScore
CVE-2011-1011
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and previous versions in Red Hat Enterprise Linux (RHEL) 6 and previous versions, and Fedora 14 and previous versions, mounts a new directory on top of /tmp with...
Redhat Policycoreutils
Redhat Policycoreutils 1.0
Redhat Policycoreutils 1.1
Redhat Policycoreutils 1.2
Redhat Policycoreutils 1.4
Redhat Policycoreutils 1.6
Redhat Policycoreutils 1.8
Redhat Policycoreutils 1.10
Redhat Policycoreutils 1.12
Redhat Policycoreutils 1.14
Redhat Policycoreutils 1.16
Redhat Policycoreutils 1.18
Redhat Policycoreutils 1.20
Redhat Policycoreutils 1.21.1
Redhat Policycoreutils 1.21.2
Redhat Policycoreutils 1.21.3
Redhat Policycoreutils 1.21.4
Redhat Policycoreutils 1.21.5
Redhat Policycoreutils 1.21.6
Redhat Policycoreutils 1.21.7
Redhat Policycoreutils 1.21.8
Redhat Policycoreutils 1.21.9
641
VMScore
CVE-2004-1057
Multiple drivers in Linux kernel 2.4.19 and previous versions do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
Linux Linux Kernel 2.0.14
Linux Linux Kernel 2.0.15
Linux Linux Kernel 2.0.22
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.3
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.1
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.2.14
Linux Linux Kernel 2.2.18
Linux Linux Kernel 2.2.19
Linux Linux Kernel 2.2.27
Linux Linux Kernel 2.2.3
Linux Linux Kernel 2.3.0
Linux Linux Kernel 2.3.99
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.18
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started