Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat linux 2.4.2 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2003-0550
The STP protocol, as enabled in Linux 2.4.x, does not provide sufficient security by design, which allows malicious users to modify the bridge topology.
Redhat Linux 2.4.2
445
VMScore
CVE-2003-0551
The STP protocol implementation in Linux 2.4.x does not properly verify certain lengths, which could allow malicious users to cause a denial of service.
Redhat Linux 2.4.2
445
VMScore
CVE-2003-0552
Linux 2.4.x allows remote malicious users to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target.
Redhat Linux 2.4.2
755
VMScore
CVE-1999-0997
wu-ftp with FTP conversion enabled allows an malicious user to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
University Of Washington Wu-ftpd 2.6.0
Millenux Gmbh Anonftp 2.8.1
University Of Washington Wu-ftpd 2.4.2
University Of Washington Wu-ftpd 2.5.0
Redhat Linux 6.1
Redhat Linux 5.2
Redhat Linux 6.0
1 EDB exploit
1000
VMScore
CVE-1999-0368
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
Washington University Wu-ftpd 2.4.2 Beta18 Vr9
Proftpd Project Proftpd 1.2 Pre1
Washington University Wu-ftpd 2.4.2 Beta18
Sco Openserver 5.0
Slackware Slackware Linux 3.5
Redhat Linux 5.1
Slackware Slackware Linux 3.4
Redhat Linux 5.0
Sco Openserver 5.0.2
Sco Openserver 5.0.5
Slackware Slackware Linux 3.6
Sco Unixware 7.0
Debian Debian Linux 2.0
Sco Openserver 5.0.3
Sco Unixware 7.0.1
Sco Openserver 5.0.4
Caldera Openlinux 1.3
2 EDB exploits
668
VMScore
CVE-1999-1333
automatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and previous versions allows remote malicious users to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded.
Redhat Linux
552
VMScore
CVE-2004-1068
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and previous versions, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Enterprise Linux 2.1
Linux Linux Kernel 2.4.0
Redhat Enterprise Linux Desktop 3.0
Linux Linux Kernel 2.4.27
Ubuntu Ubuntu Linux 4.1
Redhat Linux Advanced Workstation 2.1
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.24 Ow1
726
VMScore
CVE-2021-4034
A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle ...
Polkit Project Polkit
Redhat Enterprise Linux Desktop 7.0
Redhat Enterprise Linux Workstation 7.0
Redhat Enterprise Linux For Scientific Computing 7.0
Redhat Enterprise Linux Server 7.0
Redhat Enterprise Linux For Power Little Endian 7.0
Redhat Enterprise Linux Server 6.0
Redhat Enterprise Linux For Power Big Endian 7.0
Redhat Enterprise Linux For Ibm Z Systems 7.0
Redhat Enterprise Linux Server Aus 7.3
Redhat Enterprise Linux Server Aus 7.4
Redhat Enterprise Linux Server Tus 7.6
Redhat Enterprise Linux Server Aus 7.6
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Server Aus 7.7
Redhat Enterprise Linux Server Tus 7.7
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.2
282 Github repositories
1 Article
187
VMScore
CVE-2004-0812
Unknown vulnerability in the Linux kernel prior to 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.4.11
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux 3.0
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.2
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.14
Linux Linux Kernel 2.4.22
Linux Linux Kernel 2.4.5
Linux Linux Kernel 2.4.3
Linux Linux Kernel 2.4.1
215
VMScore
CVE-2004-1333
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 prior to 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.15
Redhat Fedora Core Core 2.0
Redhat Linux 7.3
Linux Linux Kernel 2.4.0
Linux Linux Kernel 2.6.5
Linux Linux Kernel 2.4.11
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.4.27
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.4.19
Linux Linux Kernel 2.4.21
Linux Linux Kernel 2.4.12
Linux Linux Kernel 2.4.13
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.3
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6 Test9 Cvs
Linux Linux Kernel 2.6.7
Linux Linux Kernel 2.4.23 Ow2
Linux Linux Kernel 2.4.23
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »