Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.0.34 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0314
traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.
Netbsd Netbsd
Slackware Slackware Linux 2.0.34
Digital Unix 4.0
Debian Debian Linux 2.0.34
Redhat Linux 2.0.34
NA
CVE-2000-0315
traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.
Netbsd Netbsd
Slackware Slackware Linux 2.0.34
Digital Unix 4.0
Debian Debian Linux 2.0.34
Redhat Linux 2.0.34
NA
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Debian Debian Linux 2.1
Redhat Linux 5.2
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.35
1 EDB exploit
NA
CVE-2007-0455
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
Gd Graphics Library Project Gd Graphics Library
Php Php
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 13
Fedoraproject Fedora 14
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
NA
CVE-2011-1011
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and previous versions in Red Hat Enterprise Linux (RHEL) 6 and previous versions, and Fedora 14 and previous versions, mounts a new directory on top of /tmp with...
Redhat Policycoreutils
Redhat Policycoreutils 1.0
Redhat Policycoreutils 1.1
Redhat Policycoreutils 1.2
Redhat Policycoreutils 1.4
Redhat Policycoreutils 1.6
Redhat Policycoreutils 1.8
Redhat Policycoreutils 1.10
Redhat Policycoreutils 1.12
Redhat Policycoreutils 1.14
Redhat Policycoreutils 1.16
Redhat Policycoreutils 1.18
Redhat Policycoreutils 1.20
Redhat Policycoreutils 1.21.1
Redhat Policycoreutils 1.21.2
Redhat Policycoreutils 1.21.3
Redhat Policycoreutils 1.21.4
Redhat Policycoreutils 1.21.5
Redhat Policycoreutils 1.21.6
Redhat Policycoreutils 1.21.7
Redhat Policycoreutils 1.21.8
Redhat Policycoreutils 1.21.9
NA
CVE-2004-1057
Multiple drivers in Linux kernel 2.4.19 and previous versions do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.4.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.0.31
Linux Linux Kernel 2.0.24
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.0.9
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Redhat Enterprise Linux 3.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started