Known Vulnerabilities for Debian-lan-config by Debian

Listed below are 1 of the newest known vulnerabilities associated with "Debian-lan-config" by "Debian".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2019-3467 Debian-edu-config all versions < 2.11.10, a set of configuration files used for Debian Edu, and debian-lan-config < 0.26, con... 7.8 - HIGH 2019-12-23 2022-12-22

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationDebianDebian-lan-config0.26AllAllAll
ApplicationDebianDebian-lan-config0.25AllAllAll
ApplicationDebianDebian-lan-config0.23AllAllAll
ApplicationDebianDebian-lan-config0.19AllAllAll
ApplicationDebianDebian-lan-config-AllAllAll

Popular searches for Debian-lan-config

WakeOnLan - Debian Wiki

wiki.debian.org/WakeOnLan

WakeOnLan - Debian Wiki Wake On LAN WOL enables other systems on your local area network LAN to turn on your system over the network. Support for WOL is required in your network card, motherboard, UEFI/BIOS boot firmware and operating system network configuration. You can check if WOL is enabled using the ethtool command from the ethtool package:. $ sudo ethtool eth0 Settings for eth0: Supported ports: MII Supported link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full 1000baseT/Full Supported pause frame use: No Supports auto-negotiation: Yes Advertised link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full 1000baseT/Full Advertised pause frame use: No Advertised auto-negotiation: Yes Speed: 100Mb/s Duplex: Full Port: MII PHYAD: 1 Transceiver: external Auto-negotiation: on Supports Wake-on: g Wake-on: g Link detected: yes.

Wake-on-LAN Ethtool Fast Ethernet Ethernet over twisted pair Network interface controller Motherboard IEEE 802.11g-2003 Sudo Booting Firmware Ethernet flow control Debian Computer network BIOS Network booting Unified Extensible Firmware Interface Wiki Operating system Media-independent interface Local area network

Netzkonfiguration Debian - Hetzner Docs

wiki.hetzner.de/index.php/Netzkonfiguration_Debian

Netzkonfiguration Debian - Hetzner Docs Die Hauptadresse eines Root-Servers liegt in der Regel in einem /26 oder /27-Netz. Um die versehentliche bernahme fremder IP-Adresse zu verhindern, ist ausschlielich die Kommunikation mit der Gateway-Adresse mglich. /32 genutzt; der Server geht so davon aus, sich alleine in seinem Ethernet-Segment zu befinden und stellt keine Pakete direkt zu. ## /etc/network/interfaces Beispiel Hetzner Rootserver # Loopback-Adapter auto lo iface lo inet loopback # # LAN-Schnittstelle auto eth0 iface eth0 inet static # Haupt-IP-Adresse des Servers address 192.168.0.250 # Netzmaske 255.255.255.255.

Die (integrated circuit) Server (computing) Internet Protocol Debian Loopback Xneelo APT (software) Private network JavaScript IPv4 IPv6 Network interface controller Local area network Ethernet Memory address Root name server Gateway, Inc. Google Docs Subnetwork IP address

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report