Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2000-0584
Buffer overflow in Canna input system allows remote malicious users to execute arbitrary commands via an SR_INIT command with a long user name or group name.
Freebsd Freebsd 3.5
Debian Debian Linux 2.1
1 EDB exploit
7.5
CVSSv2
CVE-2014-0175
mcollective has a default password set at install
Puppet Marionette Collective -
Redhat Openshift 2.1
Redhat Openshift 1.0
Debian Debian Linux 8.0
Debian Debian Linux 10.0
7.5
CVSSv2
CVE-1999-0434
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Debian Debian Linux 2.0
Debian Debian Linux 2.1
Netbsd Netbsd 1.3.3
Redhat Linux 5.1
Caldera Openlinux 1.2
Suse Suse Linux 5.3
7.2
CVSSv2
CVE-2001-1561
Buffer overflow in Xvt 2.1 in Debian Linux 2.2 allows local users to execute arbitrary code via long (1) -name and (2) -T arguments.
John Bovey Xvt 2.1
Debian Debian Linux 2.2
1 EDB exploit
2.1
CVSSv2
CVE-1999-1496
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
Todd Miller Sudo 1.5
Debian Debian Linux 2.1
Redhat Linux 6.0
4.6
CVSSv2
CVE-2001-0886
Buffer overflow in glob function of glibc allows malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
Debian Debian Linux 2.1
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
Redhat Linux
5
CVSSv2
CVE-1999-0804
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.0
Suse Suse Linux 6.1
Redhat Linux 6.0
1 EDB exploit
7.2
CVSSv2
CVE-2000-0606
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
7.2
CVSSv2
CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
5
CVSSv2
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Redhat Linux 6.0
Redhat Linux 6.1
Debian Debian Linux 2.2
Linux Linux Kernel 2.2.12
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.14
Redhat Linux 6.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »