Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0804
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.0
Suse Suse Linux 6.1
Redhat Linux 6.0
1 EDB exploit
NA
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 4.0
Conectiva Linux 4.0es
Debian Debian Linux 2.2
Debian Debian Linux 2.3
Redhat Linux 6.1
Suse Suse Linux 6.4
Redhat Linux 6.2
Suse Suse Linux 7.0
Redhat Linux 6.0
Suse Suse Linux 6.3
Trustix Secure Linux 1.0
Trustix Secure Linux 1.1
3 EDB exploits
6.1
CVSSv3
CVE-2019-20479
A flaw was found in mod_auth_openidc before version 2.4.1. An open redirect issue exists in URLs with a slash and backslash at the beginning.
Openidc Mod Auth Openidc
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Opensuse Leap 15.1
9.8
CVSSv3
CVE-2018-1000178
A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcore in void DataStreamPeer::processMessage(const QByteArray &msg) datastreampeer.cpp line 62 that allows an malicious user to execute code remotely.
Quassel-irc Quassel 0.12.4
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
NA
CVE-2005-4347
The Linux 2.4 kernel patch in kernel-patch-vserver prior to 1.9.5.5 and 2.x prior to 2.3 for Debian GNU/Linux does not correctly set the "chroot barrier" with util-vserver, which allows malicious users to access files on the host system that are outside of the vserver.
Debian Kernel-patch-vserver
Debian Debian Linux 3.0
Debian Debian Linux 3.1
NA
CVE-2001-0170
glibc 2.1.9x and previous versions does not properly clear the RESOLV_HOST_CONF, HOSTALIASES, or RES_OPTIONS environmental variables when executing setuid/setgid programs, which could allow local users to read arbitrary files.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Conectiva Linux 5.1
Conectiva Linux 6.0
Immunix Immunix 7.0 Beta
Conectiva Linux 4.0
Conectiva Linux Ecommerce
Conectiva Linux Graficas
Conectiva Linux 4.2
Conectiva Linux 5.0
Debian Debian Linux 2.3
Redhat Linux 7.0
2 EDB exploits
7.5
CVSSv3
CVE-2018-1000179
A NULL Pointer Dereference of CWE-476 exists in quassel version 0.12.4 in the quasselcore void CoreAuthHandler::handle(const Login &msg) coreauthhandler.cpp line 235 that allows an malicious user to cause a denial of service.
Quassel-irc Quassel 0.12.4
Debian Debian Linux 8.0
Debian Debian Linux 9.0
6.3
CVSSv3
CVE-2023-5115
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an malicious user to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
Redhat Ansible Automation Platform 1.2
Redhat Ansible Automation Platform 2.3
Redhat Ansible Automation Platform 2.4
Redhat Ansible Inside 1.1
Redhat Ansible Inside 1.2
Redhat Ansible Developer 1.0
Redhat Ansible Developer 1.1
Debian Debian Linux 10.0
7.8
CVSSv3
CVE-2019-7524
In Dovecot prior to 2.2.36.3 and 2.3.x prior to 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
Dovecot Dovecot
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 18.10
Opensuse Leap 42.3
Opensuse Leap 15.0
8.8
CVSSv3
CVE-2017-12904
Improper Neutralization of Special Elements used in an OS Command in bookmarking function of Newsbeuter versions 0.7 up to and including 2.9 allows remote malicious users to perform user-assisted code execution by crafting an RSS item that includes shell code in its title and/or ...
Newsbeuter Newsbeuter 1.0
Newsbeuter Newsbeuter 2.4
Newsbeuter Newsbeuter 2.3
Newsbeuter Newsbeuter 0.8
Newsbeuter Newsbeuter 1.3
Newsbeuter Newsbeuter 0.9
Newsbeuter Newsbeuter 2.0
Newsbeuter Newsbeuter 2.1
Newsbeuter Newsbeuter 0.8.1
Newsbeuter Newsbeuter 2.8
Newsbeuter Newsbeuter 2.5
Newsbeuter Newsbeuter 0.8.2
Newsbeuter Newsbeuter 2.6
Newsbeuter Newsbeuter 0.7
Newsbeuter Newsbeuter 2.2
Newsbeuter Newsbeuter 1.1
Newsbeuter Newsbeuter 2.7
Newsbeuter Newsbeuter 2.9
Newsbeuter Newsbeuter 0.9.1
Newsbeuter Newsbeuter 1.2
Debian Debian Linux 8.0
Debian Debian Linux 7.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »