Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 3.1 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2007-5730
Heap-based buffer overflow in QEMU 0.8.2, as used in Xen and possibly other products, allows local users to execute arbitrary code via crafted data in the "net socket listen" option, aka QEMU "net socket" heap overflow. NOTE: some sources have used CVE-2007-13...
Qemu Qemu 0.8.2
Debian Debian Linux 3.1
Debian Debian Linux 4.0
755
VMScore
CVE-2005-3120
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and previous versions allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
Invisible-island Lynx
Debian Debian Linux 3.1
Debian Debian Linux 3.0
1 EDB exploit
383
VMScore
CVE-2005-2088
The Apache HTTP server prior to 1.3.34, and 2.0.x prior to 2.0.55, when acting as an HTTP proxy, allows remote malicious users to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chu...
Apache Http Server
Debian Debian Linux 3.1
Debian Debian Linux 3.0
187
VMScore
CVE-2005-2456
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an inde...
Linux Linux Kernel 2.6.0
Debian Debian Linux 3.1
445
VMScore
CVE-2005-1527
Eval injection vulnerability in awstats.pl in AWStats 6.4 and previous versions, when a URLPlugin is enabled, allows remote malicious users to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
Awstats Awstats
Canonical Ubuntu Linux 5.04
Debian Debian Linux 3.1
Debian Debian Linux 3.0
578
VMScore
CVE-2005-4178
Buffer overflow in Dropbear server prior to 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 3.0
Debian Debian Linux 3.1
668
VMScore
CVE-2005-3323
docutils in Zope 2.6, 2.7 prior to 2.7.8, and 2.8 prior to 2.8.2 allows remote malicious users to include arbitrary files via include directives in RestructuredText functionality.
Zope Zope 2.6
Zope Zope
Debian Debian Linux 3.1
Debian Debian Linux 3.0
668
VMScore
CVE-2005-2498
Eval injection vulnerability in PHPXMLRPC 1.1.1 and previous versions (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote malicious users to execute arbitrary PHP code via certain nested XML t...
Gggeek Phpxmlrpc
Debian Debian Linux 3.1
445
VMScore
CVE-2005-1920
The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x up to and including 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote malicious users to obtain sensitive information.
Kde Kde
Debian Debian Linux 3.1
668
VMScore
CVE-2005-3912
Format string vulnerability in miniserv.pl Perl web server in Webmin prior to 1.250 and Usermin prior to 1.180, with syslog logging enabled, allows remote malicious users to cause a denial of service (crash or memory consumption) and possibly execute arbitrary code via format str...
Webmin Webmin
Debian Debian Linux 3.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »