Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 3.1 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2006-1564
Untrusted search path vulnerability in libapache2-svn 1.3.0-4 for Subversion in Debian GNU/Linux includes RPATH values under the /tmp/svn directory for the (1) mod_authz_svn.so and (2) mod_dav_svn.so modules, which might allow local users to gain privileges by installing maliciou...
Debian Debian Linux 3.1
4.6
CVSSv2
CVE-2006-1566
Untrusted search path vulnerability in libtunepimp-perl 0.4.2-1 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the tunepimp.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
Debian Debian Linux 3.1
7.2
CVSSv2
CVE-2006-1772
debconf in Debian GNU/Linux, when configuring mnogosearch in the mnogosearch-common 3.2.31-1 package, uses the world-readable config.dat file instead of the restricted passwords.dat for storing the cleartext database administrator password in the mnogosearch-common/database_admin...
Debian Debian Linux 3.1
2.1
CVSSv2
CVE-2005-2456
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an inde...
Linux Linux Kernel 2.6.0
Debian Debian Linux 3.1
5
CVSSv2
CVE-2005-1527
Eval injection vulnerability in awstats.pl in AWStats 6.4 and previous versions, when a URLPlugin is enabled, allows remote malicious users to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
Awstats Awstats
Canonical Ubuntu Linux 5.04
Debian Debian Linux 3.1
Debian Debian Linux 3.0
6.5
CVSSv2
CVE-2005-4178
Buffer overflow in Dropbear server prior to 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 3.1
Debian Debian Linux 3.0
7.5
CVSSv2
CVE-2005-3323
docutils in Zope 2.6, 2.7 prior to 2.7.8, and 2.8 prior to 2.8.2 allows remote malicious users to include arbitrary files via include directives in RestructuredText functionality.
Zope Zope 2.6
Zope Zope
Debian Debian Linux 3.1
Debian Debian Linux 3.0
6.5
CVSSv2
CVE-2007-6170
SQL injection vulnerability in the Call Detail Record Postgres logging engine (cdr_pgsql) in Asterisk 1.4.x prior to 1.4.15, 1.2.x prior to 1.2.25, B.x before B.2.3.4, and C.x before C.1.0-beta6 allows remote authenticated users to execute arbitrary SQL commands via (1) ANI and (...
Digium Asterisk
Digium Asterisk C.1.0
Debian Debian Linux 3.1
Debian Debian Linux 4.0
5
CVSSv2
CVE-2005-1920
The (1) Kate and (2) Kwrite applications in KDE KDE 3.2.x up to and including 3.4.0 do not properly set the same permissions on the backup file as were set on the original file, which could allow local users and possibly remote malicious users to obtain sensitive information.
Kde Kde
Debian Debian Linux 3.1
7.5
CVSSv2
CVE-2005-2498
Eval injection vulnerability in PHPXMLRPC 1.1.1 and previous versions (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote malicious users to execute arbitrary PHP code via certain nested XML t...
Gggeek Phpxmlrpc
Debian Debian Linux 3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »