Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
debian debian linux 2.2 vulnerabilities and exploits
(subscribe to this query)
3.3
CVSSv2
CVE-2001-0131
htpasswd and htdigest in Apache 2.0a9, 1.3.14, and others allows local users to overwrite arbitrary files via a symlink attack.
Apache Http Server 1.3.14
Apache Http Server 2.0
Debian Debian Linux 2.2
5
CVSSv2
CVE-2000-0888
named in BIND 8.2 up to and including 8.2.2-P6 allows remote malicious users to cause a denial of service by sending an SRV record to the server, aka the "srv bug."
Isc Bind 8.2.1
Isc Bind 8.2.2
Isc Bind 8.2
Debian Debian Linux 2.2
7.2
CVSSv2
CVE-2000-0867
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Trustix Secure Linux 1.1
Mandrakesoft Mandrake Linux 7.0
Redhat Linux 6.2
Mandrakesoft Mandrake Linux 7.1
Debian Debian Linux 2.1
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Slackware Slackware Linux
Mandrakesoft Mandrake Linux 6.1
Debian Debian Linux 2.2
7.2
CVSSv2
CVE-2000-0229
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root.
Suse Suse Linux 6.2
Debian Debian Linux 2.2
Debian Debian Linux 2.1
Alessandro Rubini Gpm 1.19
Redhat Linux 6.0
Alessandro Rubini Gpm 1.18.1
Suse Suse Linux 6.0
Suse Suse Linux 6.1
Suse Suse Linux 6.3
Redhat Linux 6.1
Redhat Linux 6.2
Debian Debian Linux 2.0
Suse Suse Linux 5.3
1 EDB exploit
3.6
CVSSv2
CVE-2002-0044
GNU Enscript 1.6.1 and previous versions allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
Gnu Enscript
Debian Debian Linux 2.2
Redhat Linux 7.0
Redhat Linux 6.1
Redhat Linux 7.2
Redhat Linux 6.2
Redhat Linux 6.0
Redhat Linux 7.1
4.3
CVSSv2
CVE-2013-4584
Perdition prior to 2.2 may have weak security when handling outbound connections, caused by an error in the STARTTLS IMAP and POP server. ssl_outgoing_ciphers not being applied to STARTTLS connections
Horms Perdition
Debian Debian Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
7.2
CVSSv2
CVE-1999-1182
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
Delix Dld 5.2
Lst Lst Power Linux 2.2
Debian Debian Linux 4.0
Suse Suse Linux 5.0
Redhat Linux 4.1
Caldera Openlinux Lite 1.1
Redhat Linux 4.0
Redhat Linux 4.2
10
CVSSv2
CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Conectiva Linux 4.0es
Conectiva Linux 5.0
Conectiva Linux 4.0
Suse Suse Linux 6.3
Debian Debian Linux 2.3
Debian Debian Linux 2.2
Trustix Secure Linux 1.1
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.0
Trustix Secure Linux 1.0
Suse Suse Linux 6.4
Suse Suse Linux 7.0
3 EDB exploits
5
CVSSv2
CVE-1999-0804
Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
Debian Debian Linux 2.1
Linux Linux Kernel 2.2.0
Redhat Linux 6.0
Suse Suse Linux 6.1
1 EDB exploit
5
CVSSv2
CVE-2001-0925
The default installation of Apache prior to 1.3.19 allows remote malicious users to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2)...
Apache Http Server 1.3.12
Apache Http Server 1.3.17
Apache Http Server 1.3.14
Apache Http Server 1.3.11
Debian Debian Linux 2.2
4 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »