Debian » Debian Linux : Security Vulnerabilities, CVEs, Published In 2001 (Code Execution)
Buffer overflow in Xvt 2.1 in Debian Linux 2.2 allows local users to execute arbitrary code via long (1) -name and (2) -T arguments.
Max CVSS
7.2
EPSS Score
0.09%
Published
2001-12-31
Updated
2008-09-05
Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character.
Max CVSS
4.6
EPSS Score
0.09%
Published
2001-12-21
Updated
2018-05-03
Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
Max CVSS
7.5
EPSS Score
31.91%
Published
2001-10-18
Updated
2018-05-03
Buffer overflow in ftp daemon (ftpd) 6.2 in Debian GNU/Linux allows attackers to cause a denial of service and possibly execute arbitrary code via a long SITE command.
Max CVSS
7.5
EPSS Score
0.67%
Published
2001-10-18
Updated
2008-09-05
Format string vulnerability in exim (3.22-10 in Red Hat, 3.12 in Debian and 3.16 in Conectiva) in batched SMTP mode allows a remote attacker to execute arbitrary code via format strings in SMTP mail headers.
Max CVSS
7.5
EPSS Score
19.61%
Published
2001-09-20
Updated
2017-10-10
5 vulnerabilities found