Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0606
Buffer overflow in kon program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via a long -StartupMessage parameter.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
NA
CVE-2000-0607
Buffer overflow in fld program in Kanji on Console (KON) package on Linux may allow local users to gain root privileges via an input file containing long CHARSET_REGISTRY or CHARSET_ENCODING settings.
Debian Debian Linux 2.3
Redhat Linux 5.1
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 5.0
Mandrakesoft Mandrake Linux 7.1
Redhat Linux 5.2
Debian Debian Linux 2.0
Mandrakesoft Mandrake Linux 6.1
1 EDB exploit
NA
CVE-2002-1232
Memory leak in ypdb_open in yp_db.c for ypserv prior to 2.5 in the NIS package 3.9 and previous versions allows remote malicious users to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
Debian Debian Linux 2.2
Debian Debian Linux 3.0
Redhat Linux 7.0
Redhat Linux 7.3
Redhat Linux 6.2
Redhat Linux 7.2
Hp Secure Os 1.0
Redhat Linux 7.1
7.5
CVSSv3
CVE-2002-1372
Common Unix Printing System (CUPS) 1.1.14 up to and including 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote malicious user to cause a denial of service (resource exhaustion) by causing file descriptors to be ass...
Apple Cups
Apple Mac Os X 10.2.2
Apple Mac Os X 10.2
Debian Debian Linux 2.2
Debian Debian Linux 3.0
NA
CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote malicious users to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
Redhat Linux 6.0
Redhat Linux 6.1
Debian Debian Linux 2.2
Linux Linux Kernel 2.2.12
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.10
Linux Linux Kernel 2.2.14
Redhat Linux 6.2
NA
CVE-1999-0341
Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.
Debian Debian Linux 1.3.1
Slackware Slackware Linux 2.1
Slackware Slackware Linux 2.2
Slackware Slackware Linux 2.3
NA
CVE-2001-0193
Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter.
Debian Debian Linux 2.2
Suse Suse Linux 6.3
Suse Suse Linux 6.4
Suse Suse Linux 7.0
1 EDB exploit
NA
CVE-2000-0508
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote malicious users to cause a denial of service via a malformed request.
Redhat Linux 6.1
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.0
Debian Debian Linux 2.1
Debian Debian Linux 2.2
1 EDB exploit
NA
CVE-2001-0279
Buffer overflow in sudo earlier than 1.6.3p6 allows local users to gain root privileges.
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
Mandrakesoft Mandrake Linux Corporate Server 1.0.1
Debian Debian Linux 2.2
1 EDB exploit
NA
CVE-2001-0131
htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack.
Apache Http Server 1.3.14
Apache Http Server 2.0
Debian Debian Linux 2.2
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »