Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0584
Buffer overflow in Canna input system allows remote malicious users to execute arbitrary commands via an SR_INIT command with a long user name or group name.
Freebsd Freebsd 3.5
Debian Debian Linux 2.1
1 EDB exploit
9.8
CVSSv3
CVE-2014-0175
mcollective has a default password set at install
Puppet Marionette Collective -
Redhat Openshift 2.1
Redhat Openshift 1.0
Debian Debian Linux 8.0
Debian Debian Linux 10.0
NA
CVE-1999-0434
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
Debian Debian Linux 2.0
Debian Debian Linux 2.1
Netbsd Netbsd 1.3.3
Redhat Linux 5.1
Caldera Openlinux 1.2
Suse Suse Linux 5.3
NA
CVE-2001-1561
Buffer overflow in Xvt 2.1 in Debian Linux 2.2 allows local users to execute arbitrary code via long (1) -name and (2) -T arguments.
John Bovey Xvt 2.1
Debian Debian Linux 2.2
1 EDB exploit
NA
CVE-1999-1496
Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
Todd Miller Sudo 1.5
Debian Debian Linux 2.1
Redhat Linux 6.0
NA
CVE-2001-0886
Buffer overflow in glob function of glibc allows malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
Debian Debian Linux 2.1
Redhat Linux 6.2
Redhat Linux 7.0
Redhat Linux 7.1
Redhat Linux
NA
CVE-1999-0804
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.0
Suse Suse Linux 6.1
Redhat Linux 6.0
1 EDB exploit
NA
CVE-2000-0606
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
NA
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Redhat Linux 6.0
Redhat Linux 6.1
Debian Debian Linux 2.2
Linux Linux Kernel 2.2.12
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.14
Redhat Linux 6.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »