Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.0.34 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0315
traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.
Netbsd Netbsd
Slackware Slackware Linux 2.0.34
Digital Unix 4.0
Debian Debian Linux 2.0.34
Redhat Linux 2.0.34
5
CVSSv2
CVE-2000-0314
traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.
Netbsd Netbsd
Slackware Slackware Linux 2.0.34
Digital Unix 4.0
Debian Debian Linux 2.0.34
Redhat Linux 2.0.34
5
CVSSv2
CVE-1999-0986
The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
Debian Debian Linux 2.1
Redhat Linux 5.2
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.34
Linux Linux Kernel 2.0
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.38
Linux Linux Kernel 2.0.35
1 EDB exploit
7.5
CVSSv2
CVE-2007-0455
Buffer overflow in the gdImageStringFTEx function in gdft.c in GD Graphics Library 2.0.33 and previous versions allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font.
Gd Graphics Library Project Gd Graphics Library
Php Php
Canonical Ubuntu Linux 7.04
Canonical Ubuntu Linux 6.10
Canonical Ubuntu Linux 6.06
Fedoraproject Fedora 13
Fedoraproject Fedora 14
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Redhat Enterprise Linux Server 4.0
Redhat Enterprise Linux Workstation 4.0
Redhat Enterprise Linux Workstation 3.0
Redhat Enterprise Linux Server 3.0
6.9
CVSSv2
CVE-2011-1011
The seunshare_mount function in sandbox/seunshare.c in seunshare in certain Red Hat packages of policycoreutils 2.0.83 and previous versions in Red Hat Enterprise Linux (RHEL) 6 and previous versions, and Fedora 14 and previous versions, mounts a new directory on top of /tmp with...
Redhat Policycoreutils
Redhat Policycoreutils 1.0
Redhat Policycoreutils 1.1
Redhat Policycoreutils 1.2
Redhat Policycoreutils 1.4
Redhat Policycoreutils 1.6
Redhat Policycoreutils 1.8
Redhat Policycoreutils 1.10
Redhat Policycoreutils 1.12
Redhat Policycoreutils 1.14
Redhat Policycoreutils 1.16
Redhat Policycoreutils 1.18
Redhat Policycoreutils 1.20
Redhat Policycoreutils 1.21.1
Redhat Policycoreutils 1.21.2
Redhat Policycoreutils 1.21.3
Redhat Policycoreutils 1.21.4
Redhat Policycoreutils 1.21.5
Redhat Policycoreutils 1.21.6
Redhat Policycoreutils 1.21.7
Redhat Policycoreutils 1.21.8
Redhat Policycoreutils 1.21.9
7.2
CVSSv2
CVE-2004-1057
Multiple drivers in Linux kernel 2.4.19 and previous versions do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.18
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.0.20
Linux Linux Kernel 2.0.23
Linux Linux Kernel 2.0.9.9
Linux Linux Kernel 2.4.0
Redhat Enterprise Linux 4.0
Linux Linux Kernel 2.0.27
Linux Linux Kernel 2.2.21
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.0.31
Linux Linux Kernel 2.0.24
Linux Linux Kernel 2.2.13
Linux Linux Kernel 2.0.9
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.2.0
Linux Linux Kernel 2.2.6
Redhat Enterprise Linux 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38627
CVE-2022-45803
CVE-2024-38319
camera
template injection
CVE-2024-27801
CVE-2024-0762
CVE-2024-5791
unauthorized
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started