Vulnerabilities > Debian > Medium

DATE CVE VULNERABILITY TITLE RISK
2000-03-27 CVE-2000-0289 IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection.
network
low complexity
debian linux redhat
5.0
1999-12-31 CVE-1999-1330 The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf.
local
low complexity
debian redhat
4.6
1999-12-08 CVE-1999-0986 The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
network
low complexity
debian linux redhat
5.0
1999-11-19 CVE-1999-0831 Denial of service in Linux syslogd via a large number of connections.
network
low complexity
cobalt sun debian suse
5.0
1999-08-26 CVE-1999-0939 Unspecified vulnerability in Debian Linux 2.1/2.2
Denial of service in Debian IRC Epic/epic4 client via a long string.
network
low complexity
debian
5.0
1999-08-20 CVE-1999-1565 Man2html 2.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file.
local
low complexity
earl-hood debian
4.6
1999-06-22 CVE-1999-0742 Unspecified vulnerability in Debian Linux 2.1
The Debian mailman package uses weak authentication, which allows attackers to gain privileges.
network
low complexity
debian
5.0
1999-06-01 CVE-1999-0804 Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths.
network
low complexity
debian linux redhat suse
5.0
1999-01-17 CVE-1999-0678 A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
network
low complexity
apache debian
5.0
1998-09-05 CVE-1999-1048 Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \w option in the PS1 environmental variable when another user changes into that directory.
local
low complexity
debian redhat
4.6