Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-0148
Qemu prior to 2.0 block driver for Hyper-V VHDX Images is vulnerable to infinite loops and other potential issues when calculating BAT entries, due to missing bounds checks for block_size and logical_sector_size variables. These are used to derive other fields like 'sectors_...
Qemu Qemu
Redhat Enterprise Linux Server Aus 6.5
Redhat Enterprise Linux Server Tus 6.5
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Virtualization 3.0
Redhat Enterprise Linux Eus 6.5
Redhat Enterprise Linux Openstack Platform 5
437
VMScore
CVE-2012-1090
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel prior to 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
Linux Linux Kernel
Redhat Enterprise Mrg 2.0
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise High Availability Extension 11
615
VMScore
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
Linux Linux Kernel
Opensuse Leap 15.1
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 8.0
Redhat Enterprise Mrg 2.0
Fedoraproject Fedora 31
Debian Debian Linux 8.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 16.04
Netapp Cloud Backup -
Netapp Steelstore Cloud Integrated Storage -
Netapp Active Iq Unified Manager -
445
VMScore
CVE-2003-0548
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) when a chosen host expires, a different issue than CVE-2003-0549.
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1
Redhat Kdebase 2.2.3.1.20
Redhat Kdebase 2.2.3.1.22
Gnome Gdm 2.4.1.5
Redhat Kdebase 2.4.0.7.13
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.4
Redhat Kdebase 2.4.1.3.5
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.6
Gnome Gdm 2.4.1.1
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
445
VMScore
CVE-2003-0549
The X Display Manager Control Protocol (XDMCP) support for GDM prior to 2.4.1.6 allows malicious users to cause a denial of service (daemon crash) via a short authorization key name.
Redhat Kdebase 2.0 Beta2.45
Gnome Gdm 2.2.0
Gnome Gdm 2.4.1
Redhat Kdebase 2.2.3.1.20
Redhat Kdebase 2.2.3.1.22
Gnome Gdm 2.4.1.5
Redhat Kdebase 2.4.0.7.13
Gnome Gdm 2.4.1.2
Gnome Gdm 2.4.1.4
Redhat Kdebase 2.4.1.3.5
Gnome Gdm 2.4.1.3
Gnome Gdm 2.4.1.6
Gnome Gdm 2.4.1.1
Redhat Enterprise Linux 2.1
Redhat Linux Advanced Workstation 2.1
890
VMScore
CVE-2020-27846
A signature verification vulnerability exists in crewjam/saml. This flaw allows an malicious user to bypass SAML Authentication. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Grafana Grafana
Saml Project Saml
Redhat Openshift Container Platform 3.11
Redhat Enterprise Linux 8.0
Redhat Openshift Container Platform 4.0
Redhat Openshift Service Mesh 2.0
Fedoraproject Fedora 32
Fedoraproject Fedora 33
505
VMScore
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Debian Debian Linux 2.1
Redhat Linux 5.2
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.35
1 EDB exploit
890
VMScore
CVE-2011-2767
mod_perl 2.0 up to and including 2.0.10 allows malicious users to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP...
Apache Mod Perl
Debian Debian Linux 8.0
Redhat Enterprise Linux 7.4
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux 6.0
Redhat Enterprise Linux Desktop 6.0
Redhat Enterprise Linux 6.7
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux Workstation 6.0
Redhat Enterprise Linux 7.3
Redhat Enterprise Linux 7.5
Redhat Enterprise Linux 7.6
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 12.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
605
VMScore
CVE-2022-1227
A privilege escalation flaw was found in Podman. This flaw allows an malicious user to publish a malicious image to a public registry. Once this image is downloaded by a potential victim, the vulnerability is triggered after a user runs the 'podman top' command. This ac...
Podman Project Podman
Psgo Project Psgo
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux For Ibm Z Systems 7.0
Redhat Enterprise Linux 8.0
Redhat Developer Tools 1.0
Redhat Quay 3.0.0
Redhat Openshift Container Platform 4.0
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions 8.6
Redhat Enterprise Linux For Ibm Z Systems 8.6
Redhat Enterprise Linux Server Aus 8.6
Redhat Enterprise Linux Server Tus 8.6
Redhat Enterprise Linux Eus 8.6
Redhat Enterprise Linux For Power Little Endian 8.6
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.6
Fedoraproject Fedora 34
Fedoraproject Fedora 35
1 Github repository
1000
VMScore
CVE-1999-0042
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
University Of Washington Pop 3
University Of Washington Imap 4
Ibm Aix 4.2.1
Redhat Linux 2.0
Caldera Openlinux 1.0
Bsdi Bsd Os 3.0
Bsdi Bsd Os 2.1
Redhat Linux 4.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »