Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0076
nviboot boot script in the Debian nvi package allows local users to delete files via malformed entries in vi.recover.
Debian Debian Linux 2.1
Berkeley Nvi 1.7x
9.8
CVSSv3
CVE-2014-0175
mcollective has a default password set at install
Puppet Marionette Collective -
Redhat Openshift 2.1
Redhat Openshift 1.0
Debian Debian Linux 8.0
Debian Debian Linux 10.0
NA
CVE-1999-0434
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Debian Debian Linux 2.0
Debian Debian Linux 2.1
Netbsd Netbsd 1.3.3
Redhat Linux 5.1
Caldera Openlinux 1.2
Suse Suse Linux 5.3
NA
CVE-2001-1561
Buffer overflow in Xvt 2.1 in Debian Linux 2.2 allows local users to execute arbitrary code via long (1) -name and (2) -T arguments.
John Bovey Xvt 2.1
Debian Debian Linux 2.2
1 EDB exploit
NA
CVE-1999-1496
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
Todd Miller Sudo 1.5
Debian Debian Linux 2.1
Redhat Linux 6.0
NA
CVE-2001-0886
Buffer overflow in glob function of glibc allows malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
Debian Debian Linux 2.1
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
Redhat Linux
NA
CVE-1999-0804
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.0
Suse Suse Linux 6.1
Redhat Linux 6.0
1 EDB exploit
NA
CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
NA
CVE-2000-0606
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Redhat Linux 6.0
Redhat Linux 6.1
Debian Debian Linux 2.2
Linux Linux Kernel 2.2.12
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.14
Redhat Linux 6.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »