CVE-2001-0457
https://notcve.org/view.php?id=CVE-2001-0457
man2html before 1.5-22 allows remote attackers to cause a denial of service (memory exhaustion). • http://www.debian.org/security/2001/dsa-035 http://www.osvdb.org/5631 https://exchange.xforce.ibmcloud.com/vulnerabilities/6211 •
CVE-2001-0456
https://notcve.org/view.php?id=CVE-2001-0456
postinst installation script for Proftpd in Debian 2.2 does not properly change the "run as uid/gid root" configuration when the user enables anonymous access, which causes the server to run at a higher privilege than intended. • http://www.debian.org/security/2001/dsa-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/6208 •
CVE-2001-0441
https://notcve.org/view.php?id=CVE-2001-0441
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header. • http://archives.neohapsis.com/archives/freebsd/2001-04/0610.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000383 http://marc.info/?l=bugtraq&m=98471253131191&w=2 http://www.debian.org/security/2001/dsa-040 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-028.php3 http://www.redhat.com/support/errata/RHSA-2001-028.html http://www.securityfocus.com/bid/2493 https://exchange.xforce.ibmcloud.com/vulnerabilities/6213 •
CVE-2001-0458
https://notcve.org/view.php?id=CVE-2001-0458
Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands. • http://www.debian.org/security/2001/dsa-034 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-027.php3 http://www.novell.com/linux/security/advisories/2001_008_eperl.html http://www.securityfocus.com/bid/2464 https://exchange.xforce.ibmcloud.com/vulnerabilities/6198 •
CVE-2001-0193 – Debian 2.2 / Su.S.E 6.3/6.4/7.0 - man '-l' Format String
https://notcve.org/view.php?id=CVE-2001-0193
Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter. • https://www.exploit-db.com/exploits/20604 http://marc.info/?l=bugtraq&m=98096782126481&w=2 http://www.debian.org/security/2001/dsa-028 http://www.securityfocus.com/bid/2327 https://exchange.xforce.ibmcloud.com/vulnerabilities/6059 •