Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 2.x

This vulnerability report for Debian GNU/Linux 2.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 2.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 91 Secunia advisories
1 Vulnerabilities

Monitor Product Receive alerts for this product





54 Secunia Advisories in 2003

Secunia has issued a total of 54 Secunia advisories in 2003 for Debian GNU/Linux 2.x. Currently, 0% (0 out of 54) are marked as unpatched.

More information about the specific Secunia advisories affecting Debian GNU/Linux 2.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



nfs-utils "xlog()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 54 in 2003. 16,822 views.
Release Date:
2003-07-14
Secunia Advisory ID:
SA9259
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in nfs-utils, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


XBlockOut Multiple Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 54 in 2003. 9,322 views.
Release Date:
2003-06-20
Secunia Advisory ID:
SA9082
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has reported several vulnerabilities in XBlockOut (xbl), which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Debian update for jnethack
Vendor Patch. Secunia Advisory 3 of 54 in 2003. 8,789 views.
Release Date:
2003-06-18
Secunia Advisory ID:
SA9062
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for jnethack. These fix two vulnerabilities, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Linux-PAM User Name Spoofing Vulnerability
Vendor Patch. Secunia Advisory 4 of 54 in 2003. 16,179 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9057
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in Linux-PAM, which allows malicious, local users to escalate their privileges. [Read More]


Debian update for typespeed
Vendor Patch. Secunia Advisory 5 of 54 in 2003. 9,789 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9052
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages for typespeed. These fix a vulnerability, which potentially may be exploited by malicious people to compromise a user's system. [Read More]


Debian update for noweb
Vendor Patch. Secunia Advisory 6 of 54 in 2003. 9,338 views.
Release Date:
2003-06-17
Secunia Advisory ID:
SA9046
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for noweb. These fix a vulnerability, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Debian update for mikmod
Vendor Patch. Secunia Advisory 7 of 54 in 2003. 9,845 views.
Release Date:
2003-06-16
Secunia Advisory ID:
SA9040
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages for mikmod. These fix a vulnerability, which potentially could be exploited by malicious people to compromise a user's system. [Read More]


Debian update for nethack
Vendor Patch. Secunia Advisory 8 of 54 in 2003. 8,496 views.
Release Date:
2003-06-12
Secunia Advisory ID:
SA9004
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for nethack. These fix two vulnerabilities, which can be exploited by a malicious, local user to escalate privileges on a vulnerable system. [Read More]


Debian update for slashem
Vendor Patch. Secunia Advisory 9 of 54 in 2003. 8,856 views.
Release Date:
2003-06-12
Secunia Advisory ID:
SA9002
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for slashem. These fix a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system: [Read More]


Debian update for cupsys
Vendor Patch. Secunia Advisory 10 of 54 in 2003. 8,596 views.
Release Date:
2003-06-12
Secunia Advisory ID:
SA9006
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued updated packages for cupsys. These fix a vulnerability, which can be exploited by a malicious user to cause a DoS (Denial of Service) on a print server. [Read More]


Debian update for gzip
Vendor Patch. Secunia Advisory 11 of 54 in 2003. 9,603 views.
Release Date:
2003-06-11
Secunia Advisory ID:
SA8990
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been identified in znew allowing malicious, local users escalate privileges. [Read More]


Debian update for xaos
Vendor Patch. Secunia Advisory 12 of 54 in 2003. 8,302 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8975
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has released updated packages for xaos. These fix a vulnerability, which can be exploited by malicious, local users to escalate their privileges on a vulnerable system. [Read More]


Debian update for ircii-pana
Vendor Patch. Secunia Advisory 13 of 54 in 2003. 8,735 views.
Release Date:
2003-05-20
Secunia Advisory ID:
SA8806
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has released updated packages for ircii-pana. These fix multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 14 of 54 in 2003. 8,836 views.
Release Date:
2003-05-16
Secunia Advisory ID:
SA8797
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for sendmail to fix a privilege escalation vulnerability. [Read More]


Debian update for MySQL
Vendor Patch. Secunia Advisory 15 of 54 in 2003. 7,988 views.
Release Date:
2003-05-16
Secunia Advisory ID:
SA8796
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
From remote
Short Description:
Debian has issued updated packages for MySQL, which fix two vulnerabilities. [Read More]


Debian update for lv
Vendor Patch. Secunia Advisory 16 of 54 in 2003. 8,690 views.
Release Date:
2003-05-16
Secunia Advisory ID:
SA8795
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for lv to fix a privilege escalation vulnerability. [Read More]


Debian update for epic4
Vendor Patch. Secunia Advisory 17 of 54 in 2003. 7,268 views.
Release Date:
2003-05-02
Secunia Advisory ID:
SA8713
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has released updated packages for epic4. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for pptpd
Vendor Patch. Secunia Advisory 18 of 54 in 2003. 8,136 views.
Release Date:
2003-04-30
Secunia Advisory ID:
SA8695
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued updated packages for pptpd. These fix a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian two vulnerabilities in mime-support
Vendor Patch. Secunia Advisory 19 of 54 in 2003. 8,169 views.
Release Date:
2003-04-23
Secunia Advisory ID:
SA8641
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for mime-support. These fix two vulnerabilities, which can be exploited by malicious, local users to escalate their privileges. [Read More]


Debian update for ircii
Vendor Patch. Secunia Advisory 20 of 54 in 2003. 7,843 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8634
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has released updated packages for ircii. These fix a vulnerability, which can be exploited by malicious people to compromise a user's system running a vulnerable IRC-client. [Read More]


Xinetd Connection Reject Memory Leak
Vendor Patch. Secunia Advisory 21 of 54 in 2003. 13,056 views.
Release Date:
2003-04-22
Secunia Advisory ID:
SA8632
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Xinetd, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


Debian update for rinetd
Vendor Patch. Secunia Advisory 22 of 54 in 2003. 7,523 views.
Release Date:
2003-04-18
Secunia Advisory ID:
SA8620
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued updated packages for rinetd. These fix a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system and potentially compromise it. [Read More]


Debian update for sendmail-wide
Vendor Patch. Secunia Advisory 23 of 54 in 2003. 8,239 views.
Release Date:
2003-04-17
Secunia Advisory ID:
SA8616
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued updated packages for sendmail-wide. These fix a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


Debian update for OpenSSL
Vendor Patch. Secunia Advisory 24 of 54 in 2003. 8,825 views.
Release Date:
2003-04-17
Secunia Advisory ID:
SA8613
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued updated packages for openssl. These fix two information disclosure vulnerabilities, which can be exploited by malicious people to gain knowledge of the pre-master secret or server's private key. [Read More]


Debian update for EPIC
Vendor Patch. Secunia Advisory 25 of 54 in 2003. 7,364 views.
Release Date:
2003-04-15
Secunia Advisory ID:
SA8597
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued updated packages for epic. These fix a vulnerability, which can be exploited by a malicious server to compromise a user's system. [Read More]


Debian update for glibc
Vendor Patch. Secunia Advisory 26 of 54 in 2003. 7,565 views.
Release Date:
2003-04-09
Secunia Advisory ID:
SA8558
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued updated packages for glibc. A vulnerability has been discovered allowing malicious users to cause an integer overflow. This could lead to a Denial of Service and possibly also execution of arbitrary code. [Read More]


Debian update for xftp
Vendor Patch. Secunia Advisory 27 of 54 in 2003. 7,424 views.
Release Date:
2003-04-08
Secunia Advisory ID:
SA8548
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updated packages for xftp. These fix a vulnerability, which potentially allows malicious people to compromise a user's system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 28 of 54 in 2003. 6,155 views.
Release Date:
2003-04-08
Secunia Advisory ID:
SA8538
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued updated packages for samba. These fix some unspecified potential buffer overflow vulnerabilities as well as a vulnerability, which can be exploited by anonymous users to gain root privileges on a vulnerable system. [Read More]


Samba exploitable buffer overflow
Vendor Patch. Secunia Advisory 29 of 54 in 2003. 17,867 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8533
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Samba is vulnerable to a buffer overflow, which can be exploited by anonymous users. [Read More]


Debian Metrics Insecure Temporary File Handling
Vendor Patch. Secunia Advisory 30 of 54 in 2003. 6,983 views.
Release Date:
2003-04-07
Secunia Advisory ID:
SA8531
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian reports that a vulnerability has been discovered in the metrics package, which can be exploited by malicious, local users to escalate their privileges on the system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 31 of 54 in 2003. 7,807 views.
Release Date:
2003-04-04
Secunia Advisory ID:
SA8517
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued updated packages for sendmail. These fix a vulnerability in the address parsing, which potentially can be exploited to compromise a vulnerable mail server. [Read More]


Sendmail Address Parsing Buffer Overflow
Vendor Patch. Secunia Advisory 32 of 54 in 2003. 20,920 views.
Release Date:
2003-03-30
Secunia Advisory ID:
SA8446
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been discovered in Sendmail, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian mutt IMAP Buffer Overflow
Vendor Patch. Secunia Advisory 33 of 54 in 2003. 7,476 views.
Release Date:
2003-03-29
Secunia Advisory ID:
SA8444
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian reports that a vulnerability has been discovered in "mutt", which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Debian update for krb4
Vendor Patch. Secunia Advisory 34 of 54 in 2003. 5,779 views.
Release Date:
2003-03-28
Secunia Advisory ID:
SA8440
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Exposure of system information
Security Bypass
Where:
From remote
Short Description:
Debian has issued updated packages for Kerberos to address a cryptographic weakness. [Read More]


Debian update for listar/ecartis
Vendor Patch. Secunia Advisory 35 of 54 in 2003. 7,461 views.
Release Date:
2003-03-27
Secunia Advisory ID:
SA8430
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has released updated packages for listar/ecartis. These fix a vulnerability, which can be exploited by malicious people to reset other users' passwords. [Read More]


Debian update for lpr
Vendor Patch. Secunia Advisory 36 of 54 in 2003. 7,826 views.
Release Date:
2003-03-24
Secunia Advisory ID:
SA8398
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued updated packages for lpr. These fix a vulnerability, which can be exploited by malicious, local users to escalate their privileges to root on a vulnerable system. [Read More]


Multiple Vendor RPC XDR Library Integer Overflow
Vendor Patch. Secunia Advisory 37 of 54 in 2003. 15,785 views.
Release Date:
2003-03-20
Secunia Advisory ID:
SA8347
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability identified in multiple *NIX operating systems and software can be exploited by malicious people to conduct a DoS attack (Denial of Service) on a vulnerable system or potentially compromise it. [Read More]


Samba Packet Fragment Re-assembly Buffer Overflow
Vendor Patch. Secunia Advisory 38 of 54 in 2003. 17,979 views.
Release Date:
2003-03-17
Secunia Advisory ID:
SA8299
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been identified in Samba, which can be exploited by a malicious person to compromise a vulnerable server. [Read More]


Debian updates for file
Vendor Patch. Secunia Advisory 39 of 54 in 2003. 5,916 views.
Release Date:
2003-03-13
Secunia Advisory ID:
SA8291
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has released updates for the utility "file". These fix a vulnerability exploitable by malicious, local users to escalate their privileges. [Read More]


Debian updates for sendmail-wide
Vendor Patch. Secunia Advisory 40 of 54 in 2003. 6,416 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8212
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates for sendmail-wide. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


File utility possible privilege escalation
Vendor Patch. Secunia Advisory 41 of 54 in 2003. 9,638 views.
Release Date:
2003-03-05
Secunia Advisory ID:
SA8224
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A boundary error identified in the utility "file" included in many *nix distributions can potentially be exploited by malicious users to escalate their privileges. [Read More]


Debian updates for sendmail
Vendor Patch. Secunia Advisory 42 of 54 in 2003. 6,539 views.
Release Date:
2003-03-04
Secunia Advisory ID:
SA8210
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates for sendmail. Sendmail has been found vulnerable to an issue that could lead to remote root compromise. The problem is with parsing of certain headers. [Read More]


Debian updates for tcpdump
Vendor Patch. Secunia Advisory 43 of 54 in 2003. 6,356 views.
Release Date:
2003-02-28
Secunia Advisory ID:
SA8176
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued updates for tcpdump to fix a Denial of Service vulnerability in the handling of ISAKMP packets. [Read More]


Debian update for traceroute-nanog
Vendor Patch. Secunia Advisory 44 of 54 in 2003. 6,244 views.
Release Date:
2003-02-27
Secunia Advisory ID:
SA8172
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for traceroute-nanog. This fixes multiple older issues, which potentially can be exploited to gain escalated privileges or compromise a user's system. [Read More]


Debian updates for openssl
Vendor Patch. Secunia Advisory 45 of 54 in 2003. 6,387 views.
Release Date:
2003-02-24
Secunia Advisory ID:
SA8135
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has released updated packages for openssl. These eliminate an information disclosure vulnerability, which can be exploited by malicious people to gain knowledge of a used plaintext block in a SSL/TLS session. [Read More]


Debian updates to hypermail
Vendor Patch. Secunia Advisory 46 of 54 in 2003. 7,359 views.
Release Date:
2003-02-11
Secunia Advisory ID:
SA8030
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to fix a buffer overflow in hypermail. The buffer overflow can be exploited by returning a large DNS response or supplying a long file name. [Read More]


Debian updates to CVS
Vendor Patch. Secunia Advisory 47 of 54 in 2003. 5,708 views.
Release Date:
2003-01-21
Secunia Advisory ID:
SA7916
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to fix the double-free vulnerability in CVS, allowing anonymous remote users to execute arbitrary code. [Read More]


Debian updates to cupsys
Vendor Patch. Secunia Advisory 48 of 54 in 2003. 6,996 views.
Release Date:
2003-01-20
Secunia Advisory ID:
SA7907
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to CUPS to fix multiple vulnerabilities. [Read More]


Debian updates to IMP
Vendor Patch. Secunia Advisory 49 of 54 in 2003. 6,201 views.
Release Date:
2003-01-15
Secunia Advisory ID:
SA7874
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued updates to IMP, IMP does not verify input correctly this allows SQL injcetion. [Read More]


Debian updates to xpdf-i
Vendor Patch. Secunia Advisory 50 of 54 in 2003. 6,142 views.
Release Date:
2003-01-10
Secunia Advisory ID:
SA7847
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to xpdf-i to fix an integer overflow. [Read More]


Debian updates to Canna Japanese character server
Vendor Patch. Secunia Advisory 51 of 54 in 2003. 6,061 views.
Release Date:
2003-01-09
Secunia Advisory ID:
SA7835
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued updates to Canna. Canna suffers a buffer overflow which may be exploited from remote to cause a Denial of Service or leak information, by local users it can be exploited to gain privileges. [Read More]


Debian updates to xpdf
Vendor Patch. Secunia Advisory 52 of 54 in 2003. 6,283 views.
Release Date:
2003-01-08
Secunia Advisory ID:
SA7827
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued updates to xpdf to fix an integer overflow. [Read More]


Debian updates to mhonarc
Vendor Patch. Secunia Advisory 53 of 54 in 2003. 6,032 views.
Release Date:
2003-01-03
Secunia Advisory ID:
SA7810
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued updates mhonarc. mhonarc is vulnerable to Cross Site Scripting, it is possible to craft a mail message which can bypass mhonarcs script filter. [Read More]


Debian updates to dhcpcd
Vendor Patch. Secunia Advisory 54 of 54 in 2003. 5,850 views.
Release Date:
2003-01-02
Secunia Advisory ID:
SA7796
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued updated packages to dhcpcd. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 2.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability