Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 1.3.1 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-1999-0457
Linux ftpwatch program allows local users to gain root privileges.
Debian Debian Linux 1.3.1
Debian Debian Linux 2.0
Debian Debian Linux 1.3
641
VMScore
CVE-1999-0389
Buffer overflow in the bootp server in the Debian Linux netstd package.
Debian Debian Linux 1.3.1
Debian Debian Linux 2.0
Debian Debian Linux 1.2
Debian Debian Linux 1.1
Debian Debian Linux 1.3
725
VMScore
CVE-1999-0914
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
Debian Debian Linux 2.0
Debian Debian Linux 1.1
Debian Debian Linux 1.3
Debian Debian Linux 1.2
Debian Debian Linux 1.3.1
1 EDB exploit
409
VMScore
CVE-1999-1048
Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local malicious users to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into t...
Redhat Linux 4.2
Debian Debian Linux 1.3.1
641
VMScore
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Debian Debian Linux 1.3.1
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.2
Slackware Slackware Linux 2.3
605
VMScore
CVE-2011-1588
Thunar prior to 1.3.1 could crash when copy and pasting a file name with % format characters due to a format string error.
Xfce Thunar 1.2.0
Xfce Thunar 1.2.1
Opensuse Opensuse 11.4
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
445
VMScore
CVE-2017-18076
In strategy.rb in OmniAuth prior to 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
Omniauth Omniauth
Debian Debian Linux 9.0
Debian Debian Linux 8.0
410
VMScore
CVE-2017-16651
Roundcube Webmail prior to 1.1.10, 1.2.x prior to 1.2.7, and 1.3.x prior to 1.3.3 allows unauthorized access to arbitrary files on the host's filesystem, including configuration files, as exploited in the wild in November 2017. The attacker must be able to authenticate at th...
Roundcube Webmail 1.3.0
Roundcube Webmail 1.2.5
Roundcube Webmail
Roundcube Webmail 1.3.2
Roundcube Webmail 1.2.3
Roundcube Webmail 1.2.2
Roundcube Webmail 1.2.1
Roundcube Webmail 1.2.0
Roundcube Webmail 1.3.1
Roundcube Webmail 1.2.6
Roundcube Webmail 1.2.4
Debian Debian Linux 9.0
Debian Debian Linux 7.0
2 Github repositories
NA
CVE-2021-46828
In libtirpc prior to 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
Libtirpc Project Libtirpc
Debian Debian Linux 10.0
Debian Debian Linux 11.0
445
VMScore
CVE-2016-10746
libvirt-domain.c in libvirt prior to 1.3.1 supports virDomainGetTime API calls by guest agents with an RO connection, even though an RW connection was supposed to be required, a different vulnerability than CVE-2019-3886.
Redhat Libvirt
Debian Debian Linux 8.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2006-4304
CVE-2024-4240
arbitrary
CVE-2024-31601
XSS
CVE-2023-20198
CVE-2024-4256
CVE-2024-3342
encryption
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »