Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 5.0

This vulnerability report for Debian GNU/Linux 5.0 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 5.0 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 556 Secunia advisories
1657 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 0% (2 of 556 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Debian GNU/Linux 5.0, with all vendor patches applied, is rated Highly critical .




556 Secunia Advisories in 2003-2014

Secunia has issued a total of 556 Secunia advisories in 2003-2014 for Debian GNU/Linux 5.0. Currently, 0% (2 out of 556) are marked as unpatched with the most severe being rated Highly critical

More information about the specific Secunia advisories affecting Debian GNU/Linux 5.0 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for apache2
Vendor Patch. Secunia Advisory 1 of 19 in 2012. 1,295 views.
Release Date:
2012-02-06
Secunia Advisory ID:
SA47772
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and bypass certain security restrictions and by malicious people to disclose potentially sensitive information and bypass certain security restrictions. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 2 of 19 in 2012. 1,620 views.
Release Date:
2012-02-03
Secunia Advisory ID:
SA47801
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for iceweasel
Vendor Patch. Secunia Advisory 3 of 19 in 2012. 1,032 views.
Release Date:
2012-02-03
Secunia Advisory ID:
SA47788
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose certain sensitive information and compromise a user's system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 4 of 19 in 2012. 900 views.
Release Date:
2012-01-31
Secunia Advisory ID:
SA47764
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a weakness and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, and manipulate certain data. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 5 of 19 in 2012. 991 views.
Release Date:
2012-01-31
Secunia Advisory ID:
SA47785
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for icu
Vendor Patch. Secunia Advisory 6 of 19 in 2012. 1,136 views.
Release Date:
2012-01-30
Secunia Advisory ID:
SA47714
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for icu. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for qemu-kvm
Vendor Patch. Secunia Advisory 7 of 19 in 2012. 888 views.
Release Date:
2012-01-30
Secunia Advisory ID:
SA47721
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for qemu-kvm. This fixes a vulnerability, which can be exploited by malicious, local users in a guest virtual machine to potentially gain escalated privileges. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 8 of 19 in 2012. 1,198 views.
Release Date:
2012-01-27
Secunia Advisory ID:
SA47715
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 9 of 19 in 2012. 1,434 views.
Release Date:
2012-01-24
Secunia Advisory ID:
SA47677
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 10 of 19 in 2012. 1,054 views.
Release Date:
2012-01-16
Secunia Advisory ID:
SA47528
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially compromise an application using the library. [Read More]


Debian update for t1lib
Vendor Patch. Secunia Advisory 11 of 19 in 2012. 1,016 views.
Release Date:
2012-01-16
Secunia Advisory ID:
SA47532
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for t1lib. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for openttd
Vendor Patch. Secunia Advisory 12 of 19 in 2012. 1,051 views.
Release Date:
2012-01-12
Secunia Advisory ID:
SA47493
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openttd. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for pdns
Vendor Patch. Secunia Advisory 13 of 19 in 2012. 975 views.
Release Date:
2012-01-11
Secunia Advisory ID:
SA47489
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pdns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 14 of 19 in 2012. 1,170 views.
Release Date:
2012-01-10
Secunia Advisory ID:
SA47455
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


Debian update for super
Vendor Patch. Secunia Advisory 15 of 19 in 2012. 1,531 views.
Release Date:
2012-01-09
Secunia Advisory ID:
SA47430
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for super. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for ecryptfs-utils
Vendor Patch. Secunia Advisory 16 of 19 in 2012. 1,262 views.
Release Date:
2012-01-09
Secunia Advisory ID:
SA47451
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for ecryptfs-utils. This fixes multiple security issues, which can be exploited by malicious, local users to manipulate certain data, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Debian update for foomatic-filters
Vendor Patch. Secunia Advisory 17 of 19 in 2012. 935 views.
Release Date:
2012-01-05
Secunia Advisory ID:
SA47389
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for foomatic-filters. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for cyrus-imapd-2.2
Vendor Patch. Secunia Advisory 18 of 19 in 2012. 1,288 views.
Release Date:
2012-01-02
Secunia Advisory ID:
SA47345
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ipmitool
Vendor Patch. Secunia Advisory 19 of 19 in 2012. 1,786 views.
Release Date:
2012-01-02
Secunia Advisory ID:
SA47376
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for ipmitool. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for openswan
Vendor Patch. Secunia Advisory 1 of 153 in 2011. 1,252 views.
Release Date:
2011-12-27
Secunia Advisory ID:
SA47342
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openswan. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for krb5 and krb5-appl
Vendor Patch. Secunia Advisory 2 of 153 in 2011. 2,209 views.
Release Date:
2011-12-27
Secunia Advisory ID:
SA47341
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5 and krb5-appl. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for heimdal
Vendor Patch. Secunia Advisory 3 of 153 in 2011. 2,109 views.
Release Date:
2011-12-26
Secunia Advisory ID:
SA47374
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for heimdal. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for inetutils
Vendor Patch. Secunia Advisory 4 of 153 in 2011. 2,120 views.
Release Date:
2011-12-26
Secunia Advisory ID:
SA47373
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for inetutils. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for jasper
Vendor Patch. Secunia Advisory 5 of 153 in 2011. 1,441 views.
Release Date:
2011-12-26
Secunia Advisory ID:
SA47353
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for jasper. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for unbound
Vendor Patch. Secunia Advisory 6 of 153 in 2011. 1,310 views.
Release Date:
2011-12-23
Secunia Advisory ID:
SA47326
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for unbound. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libsoup2.4
Vendor Patch. Secunia Advisory 7 of 153 in 2011. 1,123 views.
Release Date:
2011-12-22
Secunia Advisory ID:
SA47299
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for libsoup2.4. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for lighttpd
Vendor Patch. Secunia Advisory 8 of 153 in 2011. 1,501 views.
Release Date:
2011-12-21
Secunia Advisory ID:
SA47260
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for lighttpd. This fixes a weakness and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, or cause a DoS (Denial of Service). [Read More]


Debian update for mediawiki
Vendor Patch. Secunia Advisory 9 of 153 in 2011. 1,083 views.
Release Date:
2011-12-20
Secunia Advisory ID:
SA47300
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mediawiki. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and bypass certain security restrictions. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 10 of 153 in 2011. 1,242 views.
Release Date:
2011-12-20
Secunia Advisory ID:
SA47273
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
DoS
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes a weakness and a vulnerability, which can be exploited by malicious people to disclose certain system information and cause a DoS (Denial of Service). [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 11 of 153 in 2011. 1,024 views.
Release Date:
2011-12-19
Secunia Advisory ID:
SA47259
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for dtc
Vendor Patch. Secunia Advisory 12 of 153 in 2011. 877 views.
Release Date:
2011-12-19
Secunia Advisory ID:
SA47230
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for dtc. This fixes multiple security issues and vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information and gain escalated privileges, and by malicious users to conduct script insertion attacks, conduct SQL injection attacks, and compromise a vulnerable system. [Read More]


Debian update for acpid
Vendor Patch. Secunia Advisory 13 of 153 in 2011. 1,177 views.
Release Date:
2011-12-12
Secunia Advisory ID:
SA47206
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for acpid. This fixes two security issues and a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Debian update for chasen
Vendor Patch. Secunia Advisory 14 of 153 in 2011. 1,040 views.
Release Date:
2011-12-08
Secunia Advisory ID:
SA47135
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for chasen. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 15 of 153 in 2011. 1,266 views.
Release Date:
2011-12-06
Secunia Advisory ID:
SA47091
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Spoofing
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, and compromise a vulnerable system. [Read More]


Debian update for evince
Vendor Patch. Secunia Advisory 16 of 153 in 2011. 1,231 views.
Release Date:
2011-12-05
Secunia Advisory ID:
SA47038
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for evince. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for clearsilver
Vendor Patch. Secunia Advisory 17 of 153 in 2011. 1,716 views.
Release Date:
2011-12-01
Secunia Advisory ID:
SA47016
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for clearsilver. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 18 of 153 in 2011. 921 views.
Release Date:
2011-12-01
Secunia Advisory ID:
SA47054
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for cups. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for ldns
Vendor Patch. Secunia Advisory 19 of 153 in 2011. 1,046 views.
Release Date:
2011-11-25
Secunia Advisory ID:
SA46926
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ldns. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for puppet
Vendor Patch. Secunia Advisory 20 of 153 in 2011. 1,208 views.
Release Date:
2011-11-23
Secunia Advisory ID:
SA46934
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From local network
Short Description:
Debian has issued an update for puppet. This fixes a vulnerability, which can be exploited by malicious users to conduct spoofing attacks. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 21 of 153 in 2011. 1,305 views.
Release Date:
2011-11-22
Secunia Advisory ID:
SA46913
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 22 of 153 in 2011. 1,316 views.
Release Date:
2011-11-21
Secunia Advisory ID:
SA46921
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 23 of 153 in 2011. 1,528 views.
Release Date:
2011-11-17
Secunia Advisory ID:
SA46829
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for proftpd-dfsg
Vendor Patch. Secunia Advisory 24 of 153 in 2011. 880 views.
Release Date:
2011-11-16
Secunia Advisory ID:
SA46851
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for proftpd-dfsg. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to manipulate certain data. [Read More]


Debian update for iceweasel
Vendor Patch. Secunia Advisory 25 of 153 in 2011. 1,031 views.
Release Date:
2011-11-10
Secunia Advisory ID:
SA46769
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 26 of 153 in 2011. 1,047 views.
Release Date:
2011-11-08
Secunia Advisory ID:
SA46726
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 27 of 153 in 2011. 1,053 views.
Release Date:
2011-11-07
Secunia Advisory ID:
SA46729
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and cause a DoS (Denial of Service) and by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for man2html
Vendor Patch. Secunia Advisory 28 of 153 in 2011. 1,250 views.
Release Date:
2011-11-07
Secunia Advisory ID:
SA46760
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for man2html. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 29 of 153 in 2011. 1,006 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46640
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a security issue, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for python-django
Vendor Patch. Secunia Advisory 30 of 153 in 2011. 1,289 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46614
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Manipulation of data
Exposure of system information
DoS
Where:
From remote
Short Description:
Debian has issued an update for python-django. This fixes some vulnerabilities, which can be exploited by malicious people to disclose certain system information, manipulate certain data, conduct cache poisoning attacks, and cause a DoS (Denial of Service). [Read More]


Debian update for radvd
Vendor Patch. Secunia Advisory 31 of 153 in 2011. 965 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46639
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for radvd. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for phpldapadmin
Vendor Patch. Secunia Advisory 32 of 153 in 2011. 1,440 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46672
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for phpldapadmin. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 33 of 153 in 2011. 1,036 views.
Release Date:
2011-10-25
Secunia Advisory ID:
SA46544
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 34 of 153 in 2011. 1,107 views.
Release Date:
2011-10-21
Secunia Advisory ID:
SA46482
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 35 of 153 in 2011. 858 views.
Release Date:
2011-10-11
Secunia Advisory ID:
SA46366
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for dokuwiki
Vendor Patch. Secunia Advisory 36 of 153 in 2011. 837 views.
Release Date:
2011-10-10
Secunia Advisory ID:
SA46361
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for dokuwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for cyrus-imapd-2.2
Vendor Patch. Secunia Advisory 37 of 153 in 2011. 1,073 views.
Release Date:
2011-10-07
Secunia Advisory ID:
SA46259
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to bypass certain security restrictions. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 38 of 153 in 2011. 1,457 views.
Release Date:
2011-10-06
Secunia Advisory ID:
SA46274
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for puppet
Vendor Patch. Secunia Advisory 39 of 153 in 2011. 1,244 views.
Release Date:
2011-10-04
Secunia Advisory ID:
SA46243
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Manipulation of data
Where:
From local network
Short Description:
Debian has issued an update for puppet. This fixes multiple security issues and a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious users to compromise a vulnerable system. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 40 of 153 in 2011. 1,285 views.
Release Date:
2011-09-30
Secunia Advisory ID:
SA46116
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 41 of 153 in 2011. 1,444 views.
Release Date:
2011-09-26
Secunia Advisory ID:
SA46133
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for linux-2.6. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges, by malicious people with physical access to potentially compromise a vulnerable system, and by malicious people to cause a DoS and potentially compromise a vulnerable system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 42 of 153 in 2011. 821 views.
Release Date:
2011-09-14
Secunia Advisory ID:
SA45893
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a weakness, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 43 of 153 in 2011. 1,298 views.
Release Date:
2011-09-13
Secunia Advisory ID:
SA45961
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information and by malicious users to compromise a vulnerable system. [Read More]


Debian update for chromium-browser
Vendor Patch. Secunia Advisory 44 of 153 in 2011. 1,169 views.
Release Date:
2011-09-12
Secunia Advisory ID:
SA45963
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for chromium-browser. This fixes multiple vulnerabilities, where some have an unknown impact while others can be exploited by malicious people to disclose sensitive information and compromise a user's system. [Read More]


Debian update for squid3
Vendor Patch. Secunia Advisory 45 of 153 in 2011. 1,138 views.
Release Date:
2011-09-12
Secunia Advisory ID:
SA45965
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for squid3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for bcfg2
Vendor Patch. Secunia Advisory 46 of 153 in 2011. 1,201 views.
Release Date:
2011-09-09
Secunia Advisory ID:
SA45926
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for bcfg2. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 47 of 153 in 2011. 1,241 views.
Release Date:
2011-09-06
Secunia Advisory ID:
SA45839
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, HTTP response splitting, and SQL injection attacks. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 48 of 153 in 2011. 1,225 views.
Release Date:
2011-08-30
Secunia Advisory ID:
SA45696
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian icedove Multiple Vulnerabilities
Unpatched. Secunia Advisory 49 of 153 in 2011. 1,252 views.
Release Date:
2011-08-22
Secunia Advisory ID:
SA45688
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has acknowledged multiple vulnerabilities in icedove, which an be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 50 of 153 in 2011. 1,172 views.
Release Date:
2011-08-18
Secunia Advisory ID:
SA45612
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 51 of 153 in 2011. 1,100 views.
Release Date:
2011-08-15
Secunia Advisory ID:
SA45632
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for libxfont
Vendor Patch. Secunia Advisory 52 of 153 in 2011. 1,758 views.
Release Date:
2011-08-15
Secunia Advisory ID:
SA45599
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libxfont. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for isc-dhcp and dhcp3
Vendor Patch. Secunia Advisory 53 of 153 in 2011. 1,505 views.
Release Date:
2011-08-11
Secunia Advisory ID:
SA45595
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for isc-dhcp and dhcp3. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 54 of 153 in 2011. 1,193 views.
Release Date:
2011-08-08
Secunia Advisory ID:
SA44819
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct script insertion and cross-site scripting attacks and bypass certain security restrictions. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 55 of 153 in 2011. 1,285 views.
Release Date:
2011-08-08
Secunia Advisory ID:
SA45558
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, conduct script insertion attacks, disclose system information, and delete arbitrary files and by malicious people to enumerate user accounts, bypass certain security restrictions, and conduct cross-site scripting attacks. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 56 of 153 in 2011. 1,695 views.
Release Date:
2011-08-08
Secunia Advisory ID:
SA45488
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for samba. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 57 of 153 in 2011. 1,747 views.
Release Date:
2011-07-29
Secunia Advisory ID:
SA45405
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for libsndfile
Vendor Patch. Secunia Advisory 58 of 153 in 2011. 1,451 views.
Release Date:
2011-07-29
Secunia Advisory ID:
SA45388
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libsndfile. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 59 of 153 in 2011. 2,108 views.
Release Date:
2011-07-27
Secunia Advisory ID:
SA45315
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct cross-site scripting attacks and disclose sensitive information and by malicious users and malicious people to compromise a vulnerable system. [Read More]


Debian update for opensaml2
Vendor Patch. Secunia Advisory 60 of 153 in 2011. 1,110 views.
Release Date:
2011-07-26
Secunia Advisory ID:
SA45376
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for opensaml2. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for mapserver
Vendor Patch. Secunia Advisory 61 of 153 in 2011. 1,361 views.
Release Date:
2011-07-26
Secunia Advisory ID:
SA45368
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for mapserver. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and potentially compromise a vulnerable system. [Read More]


Debian update for opie
Vendor Patch. Secunia Advisory 62 of 153 in 2011. 1,550 views.
Release Date:
2011-07-21
Secunia Advisory ID:
SA45136
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for opie. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for libvirt
Vendor Patch. Secunia Advisory 63 of 153 in 2011. 1,063 views.
Release Date:
2011-07-20
Secunia Advisory ID:
SA45241
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 64 of 153 in 2011. 930 views.
Release Date:
2011-07-18
Secunia Advisory ID:
SA45278
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Debian update for xml-security-c
Vendor Patch. Secunia Advisory 65 of 153 in 2011. 1,382 views.
Release Date:
2011-07-11
Secunia Advisory ID:
SA45198
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for xml-security-c. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 66 of 153 in 2011. 1,702 views.
Release Date:
2011-07-11
Secunia Advisory ID:
SA45201
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 67 of 153 in 2011. 1,782 views.
Release Date:
2011-07-08
Secunia Advisory ID:
SA45149
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 68 of 153 in 2011. 1,759 views.
Release Date:
2011-07-06
Secunia Advisory ID:
SA45089
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for perl
Vendor Patch. Secunia Advisory 69 of 153 in 2011. 1,525 views.
Release Date:
2011-07-04
Secunia Advisory ID:
SA45121
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for perl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 70 of 153 in 2011. 1,654 views.
Release Date:
2011-07-04
Secunia Advisory ID:
SA45115
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 71 of 153 in 2011. 1,751 views.
Release Date:
2011-07-04
Secunia Advisory ID:
SA45088
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 72 of 153 in 2011. 1,344 views.
Release Date:
2011-06-30
Secunia Advisory ID:
SA45062
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose system and potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. [Read More]


Debian update for perl
Vendor Patch. Secunia Advisory 73 of 153 in 2011. 1,274 views.
Release Date:
2011-06-21
Secunia Advisory ID:
SA44983
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for perl. This fixes a weakness, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 74 of 153 in 2011. 1,384 views.
Release Date:
2011-06-20
Secunia Advisory ID:
SA44975
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to conduct DNS cache poisoning attacks, disclose system information, disclose potentially sensitive information, bypass certain security restrictions, potentially gain escalated privileges, or cause a DoS (Denial of Service), by malicious people with physical access to potentially compromise a vulnerable system, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for movabletype-opensource
Vendor Patch. Secunia Advisory 75 of 153 in 2011. 1,036 views.
Release Date:
2011-06-17
Secunia Advisory ID:
SA44945
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for movabletype-opensource. This fixes two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and manipulate certain data. [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 76 of 153 in 2011. 1,147 views.
Release Date:
2011-06-15
Secunia Advisory ID:
SA44796
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for kolab-cyrus-imapd
Vendor Patch. Secunia Advisory 77 of 153 in 2011. 1,145 views.
Release Date:
2011-06-13
Secunia Advisory ID:
SA44913
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for kolab-cyrus-imapd. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 78 of 153 in 2011. 1,317 views.
Release Date:
2011-06-07
Secunia Advisory ID:
SA44817
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for oprofile
Vendor Patch. Secunia Advisory 79 of 153 in 2011. 1,337 views.
Release Date:
2011-06-07
Secunia Advisory ID:
SA44790
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for oprofile. This fixes a weakness, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for fontforge
Vendor Patch. Secunia Advisory 80 of 153 in 2011. 797 views.
Release Date:
2011-06-06
Secunia Advisory ID:
SA44804
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for fontforge. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 81 of 153 in 2011. 2,117 views.
Release Date:
2011-06-02
Secunia Advisory ID:
SA44633
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ejabberd
Vendor Patch. Secunia Advisory 82 of 153 in 2011. 1,657 views.
Release Date:
2011-06-01
Secunia Advisory ID:
SA44765
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for citadel
Vendor Patch. Secunia Advisory 83 of 153 in 2011. 1,163 views.
Release Date:
2011-06-01
Secunia Advisory ID:
SA44788
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for citadel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 84 of 153 in 2011. 866 views.
Release Date:
2011-06-01
Secunia Advisory ID:
SA44773
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Debian update for unbound
Vendor Patch. Secunia Advisory 85 of 153 in 2011. 1,151 views.
Release Date:
2011-05-31
Secunia Advisory ID:
SA44687
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for unbound. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 86 of 153 in 2011. 1,599 views.
Release Date:
2011-05-30
Secunia Advisory ID:
SA44677
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 87 of 153 in 2011. 1,040 views.
Release Date:
2011-05-30
Secunia Advisory ID:
SA44662
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for cyrus-imapd-2.2
Vendor Patch. Secunia Advisory 88 of 153 in 2011. 1,525 views.
Release Date:
2011-05-26
Secunia Advisory ID:
SA44670
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for apr
Vendor Patch. Secunia Advisory 89 of 153 in 2011. 1,623 views.
Release Date:
2011-05-23
Secunia Advisory ID:
SA44613
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for apr
Vendor Patch. Secunia Advisory 90 of 153 in 2011. 1,209 views.
Release Date:
2011-05-16
Secunia Advisory ID:
SA44411
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for postfix
Vendor Patch. Secunia Advisory 91 of 153 in 2011. 1,418 views.
Release Date:
2011-05-11
Secunia Advisory ID:
SA44506
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for postfix. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for zodb
Vendor Patch. Secunia Advisory 92 of 153 in 2011. 1,041 views.
Release Date:
2011-05-11
Secunia Advisory ID:
SA44488
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From local network
Short Description:
Debian has issued an update for zodb. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. [Read More]


Debian update for libmodplug
Vendor Patch. Secunia Advisory 93 of 153 in 2011. 1,055 views.
Release Date:
2011-04-27
Secunia Advisory ID:
SA44339
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libmodplug. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 94 of 153 in 2011. 1,114 views.
Release Date:
2011-04-27
Secunia Advisory ID:
SA44340
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 95 of 153 in 2011. 1,134 views.
Release Date:
2011-04-21
Secunia Advisory ID:
SA44265
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. [Read More]


Debian update for request-tracker3.6 and request-tracker3.8
Vendor Patch. Secunia Advisory 96 of 153 in 2011. 970 views.
Release Date:
2011-04-20
Secunia Advisory ID:
SA44215
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for request-tracker3.6 and request-tracker3.8. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cross-site scripting attacks, and disclose potentially sensitive information and by malicious users to disclose potentially sensitive information, conduct SQL injection attacks, and compromise a vulnerable system. [Read More]


Debian update for xmlsec1
Vendor Patch. Secunia Advisory 97 of 153 in 2011. 1,478 views.
Release Date:
2011-04-19
Secunia Advisory ID:
SA44167
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xmlsec1. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for dhcp3
Vendor Patch. Secunia Advisory 98 of 153 in 2011. 1,535 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44089
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for dhcp3. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for ikiwiki
Vendor Patch. Secunia Advisory 99 of 153 in 2011. 1,549 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44079
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ikiwiki. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for x11-xserver-utils
Vendor Patch. Secunia Advisory 100 of 153 in 2011. 1,370 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44082
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
Debian has issued an update for x11-xserver-utils. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 101 of 153 in 2011. 1,324 views.
Release Date:
2011-04-07
Secunia Advisory ID:
SA44019
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 102 of 153 in 2011. 1,080 views.
Release Date:
2011-04-07
Secunia Advisory ID:
SA44009
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 103 of 153 in 2011. 1,719 views.
Release Date:
2011-04-04
Secunia Advisory ID:
SA43934
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 104 of 153 in 2011. 1,023 views.
Release Date:
2011-03-30
Secunia Advisory ID:
SA43878
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes two vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for tomcat5.5
Vendor Patch. Secunia Advisory 105 of 153 in 2011. 1,613 views.
Release Date:
2011-03-30
Secunia Advisory ID:
SA43863
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for tomcat5.5. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious users to disclose sensitive information and manipulate certain data and by malicious people to disclose sensitive information, manipulate certain data, and cause a DoS (Denial of Service). [Read More]


Debian update for imp4
Vendor Patch. Secunia Advisory 106 of 153 in 2011. 1,319 views.
Release Date:
2011-03-28
Secunia Advisory ID:
SA43896
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for imp4. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 107 of 153 in 2011. 2,673 views.
Release Date:
2011-03-24
Secunia Advisory ID:
SA43795
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes several vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 108 of 153 in 2011. 2,185 views.
Release Date:
2011-03-22
Secunia Advisory ID:
SA43499
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for maradns
Vendor Patch. Secunia Advisory 109 of 153 in 2011. 1,985 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43107
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for maradns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 110 of 153 in 2011. 1,744 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43449
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). [Read More]


Debian update for proftpd-dfsg
Vendor Patch. Secunia Advisory 111 of 153 in 2011. 1,466 views.
Release Date:
2011-03-15
Secunia Advisory ID:
SA43726
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious users to manipulate certain data. [Read More]


Debian update for chromium-browser
Vendor Patch. Secunia Advisory 112 of 153 in 2011. 1,803 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43691
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
System access
Where:
From remote
Short Description:
Debian has issued an update for chromium-browser. This fixes some vulnerabilities, where some have an unknown impact while others can be exploited to potentially compromise a user's system. [Read More]


Debian webkit Multiple Vulnerabilities
Unpatched. Secunia Advisory 113 of 153 in 2011. 2,487 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43688
Solution Status:
Unpatched
Criticality:
Impact:
Unknown
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has acknowledged multiple vulnerabilities in webkit, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a user's system. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 114 of 153 in 2011. 2,129 views.
Release Date:
2011-03-10
Secunia Advisory ID:
SA43638
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cross-site request forgery attacks, and compromise a user's system. [Read More]


Debian update for nbd
Vendor Patch. Secunia Advisory 115 of 153 in 2011. 1,920 views.
Release Date:
2011-03-07
Secunia Advisory ID:
SA43610
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Fedora has issued an update for nbd. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for logwatch
Vendor Patch. Secunia Advisory 116 of 153 in 2011. 1,738 views.
Release Date:
2011-03-07
Secunia Advisory ID:
SA43622
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for logwatch. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 117 of 153 in 2011. 2,248 views.
Release Date:
2011-03-04
Secunia Advisory ID:
SA43583
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for dtc
Vendor Patch. Secunia Advisory 118 of 153 in 2011. 2,011 views.
Release Date:
2011-03-03
Secunia Advisory ID:
SA43523
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for dtc. This fixes multiple vulnerabilities, which can be exploited by malicious users and malicious people to bypass certain security restrictions and by malicious people to conduct SQL injection attacks. [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 119 of 153 in 2011. 1,937 views.
Release Date:
2011-03-02
Secunia Advisory ID:
SA43521
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cups. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks, disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 120 of 153 in 2011. 1,858 views.
Release Date:
2011-03-01
Secunia Advisory ID:
SA43482
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious users to cause a DoS and potentially compromise a vulnerable system. [Read More]


Debian update for pam-pgsql
Vendor Patch. Secunia Advisory 121 of 153 in 2011. 1,203 views.
Release Date:
2011-03-01
Secunia Advisory ID:
SA43505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pam-pgsql. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for avahi
Vendor Patch. Secunia Advisory 122 of 153 in 2011. 1,714 views.
Release Date:
2011-02-28
Secunia Advisory ID:
SA43465
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 123 of 153 in 2011. 1,546 views.
Release Date:
2011-02-23
Secunia Advisory ID:
SA43427
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Cross Site Scripting
Exposure of sensitive information
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes multiple vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges, disclose sensitive information, and hijack another user's session and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 124 of 153 in 2011. 1,329 views.
Release Date:
2011-02-22
Secunia Advisory ID:
SA43373
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mailman
Vendor Patch. Secunia Advisory 125 of 153 in 2011. 2,173 views.
Release Date:
2011-02-21
Secunia Advisory ID:
SA43294
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mailman. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for telepathy-gabble
Vendor Patch. Secunia Advisory 126 of 153 in 2011. 1,713 views.
Release Date:
2011-02-18
Secunia Advisory ID:
SA43404
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for telepathy-gabble. This fixes a vulnerability, which can be exploited by malicious people to conduct hijacking attacks. [Read More]


Debian update for openafs
Vendor Patch. Secunia Advisory 127 of 153 in 2011. 2,040 views.
Release Date:
2011-02-18
Secunia Advisory ID:
SA43371
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for openafs. This fixes two vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS and potentially compromise a vulnerable system. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 128 of 153 in 2011. 1,436 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43391
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Debian update for ffmpeg-debian
Vendor Patch. Secunia Advisory 129 of 153 in 2011. 1,967 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43323
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ffmpeg-debian. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for shadow
Vendor Patch. Secunia Advisory 130 of 153 in 2011. 1,697 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43345
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Debian has issued an update for shadow. This fixes a vulnerability, which can be exploited by malicious, local users to manipulate certain data. [Read More]


Debian update for chromium-browser
Vendor Patch. Secunia Advisory 131 of 153 in 2011. 4,730 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43368
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for chromium-browser. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 132 of 153 in 2011. 1,347 views.
Release Date:
2011-02-15
Secunia Advisory ID:
SA43290
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Manipulation of data
DoS
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) and manipulate certain data. [Read More]


Debian update for cgiirc
Vendor Patch. Secunia Advisory 133 of 153 in 2011. 1,348 views.
Release Date:
2011-02-10
Secunia Advisory ID:
SA43270
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued a fix for cgiirc. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 134 of 153 in 2011. 1,733 views.
Release Date:
2011-02-04
Secunia Advisory ID:
SA43155
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 135 of 153 in 2011. 1,968 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43127
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes some weaknesses, security issues, and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for pcscd
Vendor Patch. Secunia Advisory 136 of 153 in 2011. 1,780 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43112
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pcscd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 137 of 153 in 2011. 1,968 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43138
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for exim4
Vendor Patch. Secunia Advisory 138 of 153 in 2011. 2,286 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43128
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for exim4. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for hplip
Vendor Patch. Secunia Advisory 139 of 153 in 2011. 1,852 views.
Release Date:
2011-01-28
Secunia Advisory ID:
SA43083
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for hplip. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 140 of 153 in 2011. 2,952 views.
Release Date:
2011-01-27
Secunia Advisory ID:
SA43065
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. [Read More]


Debian update for dbus
Vendor Patch. Secunia Advisory 141 of 153 in 2011. 2,125 views.
Release Date:
2011-01-21
Secunia Advisory ID:
SA42960
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for dbus. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 142 of 153 in 2011. 2,337 views.
Release Date:
2011-01-18
Secunia Advisory ID:
SA42905
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a weakness and two vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for pimd
Vendor Patch. Secunia Advisory 143 of 153 in 2011. 1,635 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42793
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pimd. This fixes two security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for mydms
Vendor Patch. Secunia Advisory 144 of 153 in 2011. 1,694 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42900
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mydms. This fixes a vulnerability, which can be exploited by malicious users and malicious people to disclose sensitive information. [Read More]


Debian update for libsmi
Vendor Patch. Secunia Advisory 145 of 153 in 2011. 1,291 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42902
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libsmi. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 146 of 153 in 2011. 1,734 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42910
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mysql-dfsg-5.0
Vendor Patch. Secunia Advisory 147 of 153 in 2011. 3,124 views.
Release Date:
2011-01-14
Secunia Advisory ID:
SA42875
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg-5.0. This fixes multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for dpkg
Vendor Patch. Secunia Advisory 148 of 153 in 2011. 1,928 views.
Release Date:
2011-01-07
Secunia Advisory ID:
SA42826
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for dpkg. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data or compromise a vulnerable system. [Read More]


Debian update for libapache2-mod-fcgid
Vendor Patch. Secunia Advisory 149 of 153 in 2011. 1,934 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42815
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libapache2-mod-fcgid. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 150 of 153 in 2011. 2,097 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42808
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 151 of 153 in 2011. 2,368 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42816
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 152 of 153 in 2011. 2,772 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42811
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and bypass certain security restrictions. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 153 of 153 in 2011. 2,136 views.
Release Date:
2011-01-03
Secunia Advisory ID:
SA42725
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes a vulnerability and two weaknesses, which can be exploited by malicious people to conduct spoofing and cross-site scripting attack and disclose system information. [Read More]


Debian update for wordpress
Vendor Patch. Secunia Advisory 1 of 172 in 2010. 1,801 views.
Release Date:
2010-12-30
Secunia Advisory ID:
SA42753
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 2 of 172 in 2010. 1,690 views.
Release Date:
2010-12-27
Secunia Advisory ID:
SA42762
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 3 of 172 in 2010. 1,973 views.
Release Date:
2010-12-23
Secunia Advisory ID:
SA42667
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 4 of 172 in 2010. 2,241 views.
Release Date:
2010-12-22
Secunia Advisory ID:
SA42691
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes two vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for collectd
Vendor Patch. Secunia Advisory 5 of 172 in 2010. 1,660 views.
Release Date:
2010-12-14
Secunia Advisory ID:
SA42491
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for collectd. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 6 of 172 in 2010. 1,208 views.
Release Date:
2010-12-13
Secunia Advisory ID:
SA42574
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service). [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 7 of 172 in 2010. 1,204 views.
Release Date:
2010-12-13
Secunia Advisory ID:
SA42573
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for exim4
Vendor Patch. Secunia Advisory 8 of 172 in 2010. 2,087 views.
Release Date:
2010-12-12
Secunia Advisory ID:
SA42587
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for exim4. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 9 of 172 in 2010. 1,813 views.
Release Date:
2010-12-02
Secunia Advisory ID:
SA42429
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 10 of 172 in 2010. 1,615 views.
Release Date:
2010-12-02
Secunia Advisory ID:
SA42420
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 11 of 172 in 2010. 1,914 views.
Release Date:
2010-11-30
Secunia Advisory ID:
SA42378
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), gain escalated privileges, or to disclose certain system and potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 12 of 172 in 2010. 1,559 views.
Release Date:
2010-11-29
Secunia Advisory ID:
SA42392
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 13 of 172 in 2010. 1,984 views.
Release Date:
2010-11-23
Secunia Advisory ID:
SA42352
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 14 of 172 in 2010. 1,338 views.
Release Date:
2010-11-02
Secunia Advisory ID:
SA42026
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 15 of 172 in 2010. 1,206 views.
Release Date:
2010-11-02
Secunia Advisory ID:
SA42045
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes two vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for glibc
Vendor Patch. Secunia Advisory 16 of 172 in 2010. 1,393 views.
Release Date:
2010-10-25
Secunia Advisory ID:
SA41940
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for glibc. This fixes two weaknesses, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 17 of 172 in 2010. 1,293 views.
Release Date:
2010-10-20
Secunia Advisory ID:
SA41840
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Exposure of sensitive information
Exposure of system information
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks, disclose sensitive information, and perform certain actions with escalated privileges and by malicious people to conduct cross-site scripting attacks and disclose sensitive information. [Read More]


Debian update for poppler
Vendor Patch. Secunia Advisory 18 of 172 in 2010. 1,252 views.
Release Date:
2010-10-13
Secunia Advisory ID:
SA41793
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for poppler. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for postgresql-8.3
Vendor Patch. Secunia Advisory 19 of 172 in 2010. 1,228 views.
Release Date:
2010-10-13
Secunia Advisory ID:
SA41792
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for postgresql-8.3. This fixes a security issue, which can be exploited by malicious users to perform certain actions with escalated privileges. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 20 of 172 in 2010. 1,307 views.
Release Date:
2010-10-11
Secunia Advisory ID:
SA41739
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 21 of 172 in 2010. 1,190 views.
Release Date:
2010-10-07
Secunia Advisory ID:
SA41595
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for apr-util
Vendor Patch. Secunia Advisory 22 of 172 in 2010. 1,391 views.
Release Date:
2010-10-05
Secunia Advisory ID:
SA40905
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr-util. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 23 of 172 in 2010. 1,539 views.
Release Date:
2010-09-30
Secunia Advisory ID:
SA41633
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting, script insertion, cross-site request forgery, and SQL injection attacks. [Read More]


Debian update for git-core
Vendor Patch. Secunia Advisory 24 of 172 in 2010. 1,297 views.
Release Date:
2010-09-27
Secunia Advisory ID:
SA41582
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for git-core. This fixes a vulnerability, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for bzip2
Vendor Patch. Secunia Advisory 25 of 172 in 2010. 1,252 views.
Release Date:
2010-09-21
Secunia Advisory ID:
SA41511
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 26 of 172 in 2010. 1,359 views.
Release Date:
2010-09-21
Secunia Advisory ID:
SA41510
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes a weakness and some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious users and malicious people to bypass certain security restrictions. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 27 of 172 in 2010. 1,492 views.
Release Date:
2010-09-20
Secunia Advisory ID:
SA41483
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to disclose system information, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Debian update for squid3
Vendor Patch. Secunia Advisory 28 of 172 in 2010. 1,833 views.
Release Date:
2010-09-20
Secunia Advisory ID:
SA41534
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid3. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 29 of 172 in 2010. 1,552 views.
Release Date:
2010-09-17
Secunia Advisory ID:
SA41499
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for cvsnt
Vendor Patch. Secunia Advisory 30 of 172 in 2010. 1,757 views.
Release Date:
2010-09-14
Secunia Advisory ID:
SA41358
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for cvsnt. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for couchdb
Vendor Patch. Secunia Advisory 31 of 172 in 2010. 2,325 views.
Release Date:
2010-09-10
Secunia Advisory ID:
SA41383
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for couchdb. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 32 of 172 in 2010. 1,422 views.
Release Date:
2010-09-09
Secunia Advisory ID:
SA41331
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, or to compromise a user's system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 33 of 172 in 2010. 1,621 views.
Release Date:
2010-09-08
Secunia Advisory ID:
SA41315
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 34 of 172 in 2010. 2,196 views.
Release Date:
2010-09-07
Secunia Advisory ID:
SA41238
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for smbind
Vendor Patch. Secunia Advisory 35 of 172 in 2010. 1,251 views.
Release Date:
2010-09-06
Secunia Advisory ID:
SA41303
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for smbind. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for barnowl
Vendor Patch. Secunia Advisory 36 of 172 in 2010. 1,173 views.
Release Date:
2010-09-06
Secunia Advisory ID:
SA41260
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for barnowl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 37 of 172 in 2010. 1,247 views.
Release Date:
2010-09-01
Secunia Advisory ID:
SA41133
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 38 of 172 in 2010. 1,930 views.
Release Date:
2010-08-31
Secunia Advisory ID:
SA41105
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 39 of 172 in 2010. 1,904 views.
Release Date:
2010-08-30
Secunia Advisory ID:
SA41235
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 40 of 172 in 2010. 2,444 views.
Release Date:
2010-08-30
Secunia Advisory ID:
SA41185
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 41 of 172 in 2010. 1,575 views.
Release Date:
2010-08-30
Secunia Advisory ID:
SA41186
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes multiple vulnerabilities and security issues, which can be exploited by malicious users to conduct SQL injection attacks, manipulate certain data, and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks, HTTP redirect attacks, HTTP response splitting attacks, session fixation attacks, bypass certain security restrictions, and disclose potentially sensitive information. [Read More]


Debian update for zope-ldapuserfolder
Vendor Patch. Secunia Advisory 42 of 172 in 2010. 1,127 views.
Release Date:
2010-08-25
Secunia Advisory ID:
SA41054
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for zope-ldapuserfolder. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for lvm2
Vendor Patch. Secunia Advisory 43 of 172 in 2010. 1,493 views.
Release Date:
2010-08-23
Secunia Advisory ID:
SA41037
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for lvm2. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 44 of 172 in 2010. 1,721 views.
Release Date:
2010-08-23
Secunia Advisory ID:
SA41035
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for ghostscript
Vendor Patch. Secunia Advisory 45 of 172 in 2010. 1,795 views.
Release Date:
2010-08-20
Secunia Advisory ID:
SA40999
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ghostscript. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for lxr-cvs
Vendor Patch. Secunia Advisory 46 of 172 in 2010. 1,373 views.
Release Date:
2010-08-18
Secunia Advisory ID:
SA41010
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for lxr-cvs. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 47 of 172 in 2010. 2,472 views.
Release Date:
2010-08-13
Secunia Advisory ID:
SA40964
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes a vulnerability and a weakness, which can be exploited by malicious people to conduct cross-site request forgery attacks and cause a DoS (Denial of Service). [Read More]


Debian update for cabextract
Vendor Patch. Secunia Advisory 48 of 172 in 2010. 1,496 views.
Release Date:
2010-08-09
Secunia Advisory ID:
SA40854
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for cabextract. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for socat
Vendor Patch. Secunia Advisory 49 of 172 in 2010. 1,433 views.
Release Date:
2010-08-09
Secunia Advisory ID:
SA40914
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for socat. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 50 of 172 in 2010. 2,780 views.
Release Date:
2010-08-06
Secunia Advisory ID:
SA40860
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a weakness and two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and potentially compromise a vulnerable system. [Read More]


Debian update for wget
Vendor Patch. Secunia Advisory 51 of 172 in 2010. 1,840 views.
Release Date:
2010-08-05
Secunia Advisory ID:
SA40861
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for wget. This fixes a weakness, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for lftp
Vendor Patch. Secunia Advisory 52 of 172 in 2010. 1,428 views.
Release Date:
2010-08-04
Secunia Advisory ID:
SA40801
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for lftp. This fixes a weakness, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for avahi
Vendor Patch. Secunia Advisory 53 of 172 in 2010. 1,365 views.
Release Date:
2010-08-04
Secunia Advisory ID:
SA40853
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for avahi. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 54 of 172 in 2010. 2,351 views.
Release Date:
2010-08-03
Secunia Advisory ID:
SA40836
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 55 of 172 in 2010. 4,420 views.
Release Date:
2010-08-03
Secunia Advisory ID:
SA40834
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for ghostscript
Vendor Patch. Secunia Advisory 56 of 172 in 2010. 1,675 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40797
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ghostscript. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mapserver
Vendor Patch. Secunia Advisory 57 of 172 in 2010. 1,619 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40830
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for mapserver. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


MapServer "msTmpFile()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 58 of 172 in 2010. 2,255 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40790
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in MapServer, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for libmikmod
Vendor Patch. Secunia Advisory 59 of 172 in 2010. 2,466 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40799
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libmikmod. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for gmime2.2
Vendor Patch. Secunia Advisory 60 of 172 in 2010. 1,285 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40789
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gmime2.2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for kvirc
Vendor Patch. Secunia Advisory 61 of 172 in 2010. 1,352 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40798
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for kvirc. This fixes a vulnerability, which can be exploited by malicious people to hijack IRC connections. [Read More]


Debian update for openldap
Vendor Patch. Secunia Advisory 62 of 172 in 2010. 1,593 views.
Release Date:
2010-07-30
Secunia Advisory ID:
SA40770
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for openldap. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 63 of 172 in 2010. 1,507 views.
Release Date:
2010-07-28
Secunia Advisory ID:
SA40724
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some weaknesses and some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, conduct spoofing attacks, and compromise a user's system. [Read More]


Debian update for gnupg2
Vendor Patch. Secunia Advisory 64 of 172 in 2010. 1,749 views.
Release Date:
2010-07-28
Secunia Advisory ID:
SA40718
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gnupg2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for mlmmj
Vendor Patch. Secunia Advisory 65 of 172 in 2010. 2,336 views.
Release Date:
2010-07-21
Secunia Advisory ID:
SA40658
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mlmmj. This fixes a vulnerability, which can be exploited by malicious users to disclose system information and manipulate certain data. [Read More]


Debian update for ncompress
Vendor Patch. Secunia Advisory 66 of 172 in 2010. 1,936 views.
Release Date:
2010-07-21
Secunia Advisory ID:
SA40689
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 67 of 172 in 2010. 2,214 views.
Release Date:
2010-07-20
Secunia Advisory ID:
SA40547
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 68 of 172 in 2010. 1,432 views.
Release Date:
2010-07-15
Secunia Advisory ID:
SA40564
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for libmikmod
Vendor Patch. Secunia Advisory 69 of 172 in 2010. 1,651 views.
Release Date:
2010-07-15
Secunia Advisory ID:
SA40525
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libmikmod. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for znc
Vendor Patch. Secunia Advisory 70 of 172 in 2010. 2,157 views.
Release Date:
2010-07-12
Secunia Advisory ID:
SA40523
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for znc. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service) [Read More]


Debian update for python-cjson
Vendor Patch. Secunia Advisory 71 of 172 in 2010. 1,702 views.
Release Date:
2010-07-12
Secunia Advisory ID:
SA40500
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for python-cjson. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 72 of 172 in 2010. 1,368 views.
Release Date:
2010-07-05
Secunia Advisory ID:
SA40486
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and SQL injection attacks and bypass certain security restrictions. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 73 of 172 in 2010. 1,502 views.
Release Date:
2010-07-02
Secunia Advisory ID:
SA40423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kvirc
Vendor Patch. Secunia Advisory 74 of 172 in 2010. 2,246 views.
Release Date:
2010-06-28
Secunia Advisory ID:
SA40349
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kvirc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 75 of 172 in 2010. 1,549 views.
Release Date:
2010-06-28
Secunia Advisory ID:
SA40344
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or to compromise a user's system. [Read More]


Debian update for pmount
Vendor Patch. Secunia Advisory 76 of 172 in 2010. 1,475 views.
Release Date:
2010-06-18
Secunia Advisory ID:
SA40269
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pmount. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 77 of 172 in 2010. 2,236 views.
Release Date:
2010-06-17
Secunia Advisory ID:
SA40221
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 78 of 172 in 2010. 2,155 views.
Release Date:
2010-06-17
Secunia Advisory ID:
SA40114
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 79 of 172 in 2010. 1,367 views.
Release Date:
2010-06-14
Secunia Advisory ID:
SA40164
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes multiple vulnerabilities, which can be exploited by malicious users or malicious people to conduct SQL injection attacks. [Read More]


Debian update for pcsc-lite
Vendor Patch. Secunia Advisory 80 of 172 in 2010. 2,478 views.
Release Date:
2010-06-11
Secunia Advisory ID:
SA40140
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pcsc-lite. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for glibc and eglibc
Vendor Patch. Secunia Advisory 81 of 172 in 2010. 1,875 views.
Release Date:
2010-06-10
Secunia Advisory ID:
SA40121
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for glibc and eglibc. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for mysql-dfsg
Vendor Patch. Secunia Advisory 82 of 172 in 2010. 1,443 views.
Release Date:
2010-06-08
Secunia Advisory ID:
SA40035
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to manipulate certain data, by malicious users to bypass certain security restrictions or potentially compromise a vulnerable system, and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for zonecheck
Vendor Patch. Secunia Advisory 83 of 172 in 2010. 1,802 views.
Release Date:
2010-06-07
Secunia Advisory ID:
SA40083
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for zonecheck. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 84 of 172 in 2010. 2,616 views.
Release Date:
2010-06-07
Secunia Advisory ID:
SA40084
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 85 of 172 in 2010. 2,678 views.
Release Date:
2010-06-07
Secunia Advisory ID:
SA40086
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes some vulnerabilities, which can be exploited by malicious people to poison the DNS cache. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 86 of 172 in 2010. 3,561 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39830
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, and potentially gain escalated privileges, and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 87 of 172 in 2010. 2,319 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39849
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 88 of 172 in 2010. 2,900 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39938
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes multiple vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for postgresql-8.3
Vendor Patch. Secunia Advisory 89 of 172 in 2010. 3,209 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39939
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for postgresql-8.3. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system. [Read More]


Debian update for dvipng
Vendor Patch. Secunia Advisory 90 of 172 in 2010. 1,994 views.
Release Date:
2010-05-24
Secunia Advisory ID:
SA39914
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for dvipng. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for barnowl
Vendor Patch. Secunia Advisory 91 of 172 in 2010. 1,670 views.
Release Date:
2010-05-24
Secunia Advisory ID:
SA39908
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for barnowl. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for aria2
Vendor Patch. Secunia Advisory 92 of 172 in 2010. 1,839 views.
Release Date:
2010-05-18
Secunia Advisory ID:
SA39759
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for aria2. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 93 of 172 in 2010. 3,721 views.
Release Date:
2010-05-14
Secunia Advisory ID:
SA39731
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information. [Read More]


Debian update for libtheora
Vendor Patch. Secunia Advisory 94 of 172 in 2010. 1,804 views.
Release Date:
2010-05-12
Secunia Advisory ID:
SA39735
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libtheora. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 95 of 172 in 2010. 1,964 views.
Release Date:
2010-05-11
Secunia Advisory ID:
SA39789
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for mplayer
Vendor Patch. Secunia Advisory 96 of 172 in 2010. 1,732 views.
Release Date:
2010-05-11
Secunia Advisory ID:
SA39794
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for iscsitarget
Vendor Patch. Secunia Advisory 97 of 172 in 2010. 1,889 views.
Release Date:
2010-05-07
Secunia Advisory ID:
SA39726
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for iscsitarget. This fixes multiple vulnerabilities which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mediawiki
Vendor Patch. Secunia Advisory 98 of 172 in 2010. 1,671 views.
Release Date:
2010-05-04
Secunia Advisory ID:
SA39581
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mediawiki. This fixes a vulnerability, which can be exploited by malicious users to conduct cross-site request forgery attacks. [Read More]


Debian update for squidguard
Vendor Patch. Secunia Advisory 99 of 172 in 2010. 1,905 views.
Release Date:
2010-05-03
Secunia Advisory ID:
SA39679
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for squidguard. This fixes some security issues, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 100 of 172 in 2010. 2,378 views.
Release Date:
2010-04-26
Secunia Advisory ID:
SA39572
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for jasper
Vendor Patch. Secunia Advisory 101 of 172 in 2010. 1,639 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for jasper. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for pidgin
Vendor Patch. Secunia Advisory 102 of 172 in 2010. 1,968 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39509
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pidgin. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kdm
Vendor Patch. Secunia Advisory 103 of 172 in 2010. 1,829 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39506
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for kdm. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 104 of 172 in 2010. 2,545 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39501
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious people to gain access to potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 105 of 172 in 2010. 2,402 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39503
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some security issues, which can be exploited by malicious users to manipulate certain data and potentially perform certain actions with escalated privileges, and by malicious people to bypass certain security restrictions. [Read More]


Debian update for ejabberd
Vendor Patch. Secunia Advisory 106 of 172 in 2010. 2,514 views.
Release Date:
2010-04-16
Secunia Advisory ID:
SA39423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 107 of 172 in 2010. 2,128 views.
Release Date:
2010-04-12
Secunia Advisory ID:
SA39251
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 108 of 172 in 2010. 1,810 views.
Release Date:
2010-04-12
Secunia Advisory ID:
SA39367
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 109 of 172 in 2010. 1,207 views.
Release Date:
2010-04-07
Secunia Advisory ID:
SA39322
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes a vulnerability, which can be exploited by malicious users and malicious people to conduct SQL injection attacks. [Read More]


Debian update for imlib2
Vendor Patch. Secunia Advisory 110 of 172 in 2010. 1,818 views.
Release Date:
2010-04-06
Secunia Advisory ID:
SA39340
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 111 of 172 in 2010. 2,262 views.
Release Date:
2010-04-06
Secunia Advisory ID:
SA39327
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for netpbm-free
Vendor Patch. Secunia Advisory 112 of 172 in 2010. 1,297 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39268
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for netpbm-free. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 113 of 172 in 2010. 2,984 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39308
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 114 of 172 in 2010. 2,124 views.
Release Date:
2010-03-31
Secunia Advisory ID:
SA39190
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for icedove
Vendor Patch. Secunia Advisory 115 of 172 in 2010. 1,525 views.
Release Date:
2010-03-31
Secunia Advisory ID:
SA39184
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for icedove. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or to compromise a vulnerable system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 116 of 172 in 2010. 2,106 views.
Release Date:
2010-03-29
Secunia Advisory ID:
SA39087
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a security issue, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for mediawiki
Vendor Patch. Secunia Advisory 117 of 172 in 2010. 2,430 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39022
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mediawiki. This fixes a vulnerability and a security issue, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions. [Read More]


Debian update for spamass-milter
Vendor Patch. Secunia Advisory 118 of 172 in 2010. 3,894 views.
Release Date:
2010-03-22
Secunia Advisory ID:
SA38956
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for spamass-milter. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for pango1.0
Vendor Patch. Secunia Advisory 119 of 172 in 2010. 2,111 views.
Release Date:
2010-03-22
Secunia Advisory ID:
SA39041
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pango1.0. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ikiwiki
Vendor Patch. Secunia Advisory 120 of 172 in 2010. 2,076 views.
Release Date:
2010-03-22
Secunia Advisory ID:
SA39048
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ikiwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 121 of 172 in 2010. 2,134 views.
Release Date:
2010-03-19
Secunia Advisory ID:
SA38930
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for drbd8
Vendor Patch. Secunia Advisory 122 of 172 in 2010. 1,395 views.
Release Date:
2010-03-17
Secunia Advisory ID:
SA38919
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for drbd8. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for pulseaudio
Vendor Patch. Secunia Advisory 123 of 172 in 2010. 1,682 views.
Release Date:
2010-03-17
Secunia Advisory ID:
SA38991
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for pulseaudio. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 124 of 172 in 2010. 1,412 views.
Release Date:
2010-03-15
Secunia Advisory ID:
SA38950
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and bypass certain security restrictions. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 125 of 172 in 2010. 2,326 views.
Release Date:
2010-03-12
Secunia Advisory ID:
SA38903
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes multiple vulnerabilities with an unknown impact. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 126 of 172 in 2010. 2,221 views.
Release Date:
2010-03-12
Secunia Advisory ID:
SA38905
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes a vulnerability and a security issue, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Debian update for egroupware
Vendor Patch. Secunia Advisory 127 of 172 in 2010. 1,819 views.
Release Date:
2010-03-12
Secunia Advisory ID:
SA38924
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for egroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system [Read More]


Debian update for dpkg
Vendor Patch. Secunia Advisory 128 of 172 in 2010. 1,617 views.
Release Date:
2010-03-11
Secunia Advisory ID:
SA38907
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for dpkg. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system. [Read More]


Debian update for kvm
Vendor Patch. Secunia Advisory 129 of 172 in 2010. 1,432 views.
Release Date:
2010-03-11
Secunia Advisory ID:
SA38901
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for kvm. This fixes some vulnerabilities, which can be exploited by malicious, local users in a KVM guest to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Debian update for tdiary
Vendor Patch. Secunia Advisory 130 of 172 in 2010. 1,570 views.
Release Date:
2010-03-10
Secunia Advisory ID:
SA38868
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for tdiary. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 131 of 172 in 2010. 1,307 views.
Release Date:
2010-03-09
Secunia Advisory ID:
SA38892
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information and conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 132 of 172 in 2010. 1,464 views.
Release Date:
2010-03-04
Secunia Advisory ID:
SA38798
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 133 of 172 in 2010. 1,968 views.
Release Date:
2010-03-03
Secunia Advisory ID:
SA38762
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes multiple security issues, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 134 of 172 in 2010. 1,701 views.
Release Date:
2010-03-01
Secunia Advisory ID:
SA38811
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for samba. This fixes a weakness and a security issue, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and potentially gain escalated privileges. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 135 of 172 in 2010. 2,265 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38648
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes two vulnerabilities, where one has unknown impacts and the other can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for polipo
Vendor Patch. Secunia Advisory 136 of 172 in 2010. 1,725 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38647
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for polipo. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ffmpeg
Vendor Patch. Secunia Advisory 137 of 172 in 2010. 2,058 views.
Release Date:
2010-02-19
Secunia Advisory ID:
SA38643
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for ffmpeg. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 138 of 172 in 2010. 1,674 views.
Release Date:
2010-02-19
Secunia Advisory ID:
SA38644
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. [Read More]


Debian update for kdelibs
Vendor Patch. Secunia Advisory 139 of 172 in 2010. 1,746 views.
Release Date:
2010-02-18
Secunia Advisory ID:
SA38624
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 140 of 172 in 2010. 3,384 views.
Release Date:
2010-02-15
Secunia Advisory ID:
SA38492
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for the linux-2.6. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), manipulate certain data, disclose potentially sensitive information, bypass certain security issues, and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for mysql-dfsg-5.0
Vendor Patch. Secunia Advisory 141 of 172 in 2010. 2,506 views.
Release Date:
2010-02-15
Secunia Advisory ID:
SA38573
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg-5.0. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, malicious users to cause a DoS (Denial of Service), and malicious people to compromise a vulnerable system. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 142 of 172 in 2010. 1,963 views.
Release Date:
2010-02-15
Secunia Advisory ID:
SA38549
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or compromise a user's system. [Read More]


Debian update for ajaxterm
Vendor Patch. Secunia Advisory 143 of 172 in 2010. 1,584 views.
Release Date:
2010-02-12
Secunia Advisory ID:
SA38560
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Brute force
Where:
From remote
Short Description:
Debian has issued an update for ajaxterm. This fixes a security issue, which can be exploited by malicious people to conduct hijacking attacks. [Read More]


Debian update for otrs2
Vendor Patch. Secunia Advisory 144 of 172 in 2010. 2,238 views.
Release Date:
2010-02-11
Secunia Advisory ID:
SA38544
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for otrs2. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for chrony
Vendor Patch. Secunia Advisory 145 of 172 in 2010. 2,815 views.
Release Date:
2010-02-05
Secunia Advisory ID:
SA38480
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for chrony. This fixes a security issue and a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for squid and squid3
Vendor Patch. Secunia Advisory 146 of 172 in 2010. 1,820 views.
Release Date:
2010-02-05
Secunia Advisory ID:
SA38429
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid and squid3. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for trac-git
Vendor Patch. Secunia Advisory 147 of 172 in 2010. 3,176 views.
Release Date:
2010-02-04
Secunia Advisory ID:
SA38325
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for trac-git. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for fuse
Vendor Patch. Secunia Advisory 148 of 172 in 2010. 2,318 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38437
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
Debian has issued an update for fuse. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for qt4-x11
Vendor Patch. Secunia Advisory 149 of 172 in 2010. 2,103 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38447
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for qt4-x11. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system. [Read More]


Debian update for lighttpd
Vendor Patch. Secunia Advisory 150 of 172 in 2010. 1,269 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38361
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for lighttpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 151 of 172 in 2010. 1,629 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38360
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, and conduct SQL injection attacks and by malicious people to conduct cross-site request forgery attacks and bypass certain security restrictions. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 152 of 172 in 2010. 2,415 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38348
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


Debian update for libxerces2-java
Vendor Patch. Secunia Advisory 153 of 172 in 2010. 2,100 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38342
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libxerces2-java. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 154 of 172 in 2010. 1,925 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38314
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for hybserv
Vendor Patch. Secunia Advisory 155 of 172 in 2010. 1,860 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38350
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for hybserv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ircd-hybrid and ircd-ratbox
Vendor Patch. Secunia Advisory 156 of 172 in 2010. 3,315 views.
Release Date:
2010-01-29
Secunia Advisory ID:
SA38383
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ircd-hybrid and ircd-ratbox. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for maildrop
Vendor Patch. Secunia Advisory 157 of 172 in 2010. 2,451 views.
Release Date:
2010-01-28
Secunia Advisory ID:
SA38374
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for maildrop. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for lintian
Vendor Patch. Secunia Advisory 158 of 172 in 2010. 2,096 views.
Release Date:
2010-01-28
Secunia Advisory ID:
SA38375
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
System access
Where:
From remote
Short Description:
Debian has issued an update for lintian. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system, disclose system information, and manipulate certain data. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 159 of 172 in 2010. 1,564 views.
Release Date:
2010-01-27
Secunia Advisory ID:
SA38297
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, or conduct cross-site scripting and SQL injection attacks. [Read More]


Debian update for python2.4 and python2.5
Vendor Patch. Secunia Advisory 160 of 172 in 2010. 1,571 views.
Release Date:
2010-01-26
Secunia Advisory ID:
SA38324
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Unknown
Where:
From remote
Short Description:
Debian has issued an update for python2.4 and python2.5. This fixes some vulnerabilities, where some have unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for dokuwiki
Vendor Patch. Secunia Advisory 161 of 172 in 2010. 1,499 views.
Release Date:
2010-01-25
Secunia Advisory ID:
SA38340
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for dokuwiki. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, and conduct cross-site request forgery attacks. [Read More]


Debian update for glibc and eglibc
Vendor Patch. Secunia Advisory 162 of 172 in 2010. 1,553 views.
Release Date:
2010-01-21
Secunia Advisory ID:
SA38238
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for glibc and eglibc. This fixes a security issue which can be exploited by malicious, local users to disclose sensitive information. [Read More]


Debian update for gzip
Vendor Patch. Secunia Advisory 163 of 172 in 2010. 2,941 views.
Release Date:
2010-01-21
Secunia Advisory ID:
SA38223
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gzip. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for audiofile
Vendor Patch. Secunia Advisory 164 of 172 in 2010. 1,327 views.
Release Date:
2010-01-18
Secunia Advisory ID:
SA38250
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for audiofile. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for libthai
Vendor Patch. Secunia Advisory 165 of 172 in 2010. 2,296 views.
Release Date:
2010-01-15
Secunia Advisory ID:
SA38213
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libthai. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 166 of 172 in 2010. 2,661 views.
Release Date:
2010-01-14
Secunia Advisory ID:
SA38181
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 167 of 172 in 2010. 1,953 views.
Release Date:
2010-01-13
Secunia Advisory ID:
SA38140
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for pdns-recursor
Vendor Patch. Secunia Advisory 168 of 172 in 2010. 1,464 views.
Release Date:
2010-01-11
Secunia Advisory ID:
SA38143
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for pdns-recursor. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks and potentially compromise a vulnerable system. [Read More]


Debian update for transmission
Vendor Patch. Secunia Advisory 169 of 172 in 2010. 2,816 views.
Release Date:
2010-01-08
Secunia Advisory ID:
SA37993
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for transmission. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 170 of 172 in 2010. 1,591 views.
Release Date:
2010-01-08
Secunia Advisory ID:
SA38013
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks. [Read More]


Debian update for phpldapadmin
Vendor Patch. Secunia Advisory 171 of 172 in 2010. 1,626 views.
Release Date:
2010-01-07
Secunia Advisory ID:
SA38110
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpldapadmin. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 172 of 172 in 2010. 1,432 views.
Release Date:
2010-01-04
Secunia Advisory ID:
SA38099
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct spoofing attacks. [Read More]


Debian update for libtool
Vendor Patch. Secunia Advisory 1 of 212 in 2009. 2,142 views.
Release Date:
2009-12-30
Secunia Advisory ID:
SA37942
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libtool. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for aria2
Vendor Patch. Secunia Advisory 2 of 212 in 2009. 1,960 views.
Release Date:
2009-12-29
Secunia Advisory ID:
SA37971
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for aria2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for unbound
Vendor Patch. Secunia Advisory 3 of 212 in 2009. 2,351 views.
Release Date:
2009-12-24
Secunia Advisory ID:
SA37913
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for unbound. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for kvm
Vendor Patch. Secunia Advisory 4 of 212 in 2009. 2,061 views.
Release Date:
2009-12-23
Secunia Advisory ID:
SA37908
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for kvm. This fixes some vulnerabilities, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 5 of 212 in 2009. 1,894 views.
Release Date:
2009-12-23
Secunia Advisory ID:
SA37904
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. [Read More]


Debian update for acpid
Vendor Patch. Secunia Advisory 6 of 212 in 2009. 1,702 views.
Release Date:
2009-12-21
Secunia Advisory ID:
SA37885
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for acpid. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for ganeti
Vendor Patch. Secunia Advisory 7 of 212 in 2009. 1,630 views.
Release Date:
2009-12-21
Secunia Advisory ID:
SA37884
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
Debian has issued an update for ganeti. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges or by malicious users to compromise a vulnerable system. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 8 of 212 in 2009. 1,770 views.
Release Date:
2009-12-17
Secunia Advisory ID:
SA37816
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks, and by malicious people to conduct cross-site scripting attacks and to cause a DoS (Denial of Service). [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 9 of 212 in 2009. 2,849 views.
Release Date:
2009-12-17
Secunia Advisory ID:
SA37813
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct spoofing attacks, or compromise a user's system. [Read More]


Debian update for network-manager
Vendor Patch. Secunia Advisory 10 of 212 in 2009. 1,684 views.
Release Date:
2009-12-17
Secunia Advisory ID:
SA37817
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for network-manager. This fixes a security issue, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Debian update for firefox-sage
Vendor Patch. Secunia Advisory 11 of 212 in 2009. 1,764 views.
Release Date:
2009-12-16
Secunia Advisory ID:
SA37773
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for firefox-sage. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for expat
Vendor Patch. Secunia Advisory 12 of 212 in 2009. 1,607 views.
Release Date:
2009-12-16
Secunia Advisory ID:
SA37688
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for expat. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 13 of 212 in 2009. 2,564 views.
Release Date:
2009-12-16
Secunia Advisory ID:
SA37677
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious people to determine valid user names and to cause a DoS (Denial of Service). [Read More]


Debian update for webkit
Vendor Patch. Secunia Advisory 14 of 212 in 2009. 2,951 views.
Release Date:
2009-12-14
Secunia Advisory ID:
SA37746
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for webkit. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose sensitive information, conduct cross-site scripting attacks, conduct cross-site request forgery attacks, bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a user's system. [Read More]


Debian update for php-net-ping
Vendor Patch. Secunia Advisory 15 of 212 in 2009. 1,655 views.
Release Date:
2009-12-14
Secunia Advisory ID:
SA37745
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for php-net-ping. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for ntp
Vendor Patch. Secunia Advisory 16 of 212 in 2009. 1,565 views.
Release Date:
2009-12-09
Secunia Advisory ID:
SA37636
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ntp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for shibboleth-sp, shibboleth-sp2, and opensaml2
Vendor Patch. Secunia Advisory 17 of 212 in 2009. 1,794 views.
Release Date:
2009-12-08
Secunia Advisory ID:
SA37596
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for shibboleth-sp, shibboleth-sp2, and opensaml2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting and potentially script insertion attacks. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 18 of 212 in 2009. 1,840 views.
Release Date:
2009-12-04
Secunia Advisory ID:
SA37587
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for gforge. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for request-tracker
Vendor Patch. Secunia Advisory 19 of 212 in 2009. 1,778 views.
Release Date:
2009-12-04
Secunia Advisory ID:
SA37586
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for request-tracker. This fixes a vulnerability, which can be exploited by malicious people to conduct session fixation attacks. [Read More]


Debian update for openldap
Vendor Patch. Secunia Advisory 20 of 212 in 2009. 1,953 views.
Release Date:
2009-12-03
Secunia Advisory ID:
SA37569
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 21 of 212 in 2009. 2,810 views.
Release Date:
2009-11-30
Secunia Advisory ID:
SA37477
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 22 of 212 in 2009. 3,612 views.
Release Date:
2009-11-26
Secunia Advisory ID:
SA37482
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes multiple vulnerabilities, some of which have unknown impact and others that can be exploited by malicious, local users and by malicious users to bypass certain security restrictions, and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for poppler
Vendor Patch. Secunia Advisory 23 of 212 in 2009. 2,179 views.
Release Date:
2009-11-26
Secunia Advisory ID:
SA37488
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for poppler. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. [Read More]


Debian update for libvorbis
Vendor Patch. Secunia Advisory 24 of 212 in 2009. 1,574 views.
Release Date:
2009-11-25
Secunia Advisory ID:
SA37463
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libvorbis. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using this library. [Read More]


Debian update for php-mail
Vendor Patch. Secunia Advisory 25 of 212 in 2009. 2,204 views.
Release Date:
2009-11-24
Secunia Advisory ID:
SA37458
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for php-mail. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 26 of 212 in 2009. 2,029 views.
Release Date:
2009-11-23
Secunia Advisory ID:
SA37450
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for gforge. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for libgd2
Vendor Patch. Secunia Advisory 27 of 212 in 2009. 1,505 views.
Release Date:
2009-11-18
Secunia Advisory ID:
SA37350
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libgd2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for gnutls13 and gnutls26
Vendor Patch. Secunia Advisory 28 of 212 in 2009. 1,556 views.
Release Date:
2009-11-18
Secunia Advisory ID:
SA37374
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for gnutls13 and gnutls26. This fixes a weakness and a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 29 of 212 in 2009. 1,977 views.
Release Date:
2009-11-17
Secunia Advisory ID:
SA37382
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), bypass certain security restrictions, and manipulate certain data. [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 30 of 212 in 2009. 1,575 views.
Release Date:
2009-11-10
Secunia Advisory ID:
SA37310
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 31 of 212 in 2009. 1,823 views.
Release Date:
2009-11-09
Secunia Advisory ID:
SA37260
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes some vulnerabilities, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions, and by malicious people to disclose sensitive information and conduct cross-site scripting attacks. [Read More]


Debian update for nspr
Vendor Patch. Secunia Advisory 32 of 212 in 2009. 1,837 views.
Release Date:
2009-11-09
Secunia Advisory ID:
SA37275
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for nspr. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for pidgin
Vendor Patch. Secunia Advisory 33 of 212 in 2009. 1,760 views.
Release Date:
2009-11-09
Secunia Advisory ID:
SA37294
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pidgin. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 34 of 212 in 2009. 1,750 views.
Release Date:
2009-11-06
Secunia Advisory ID:
SA37266
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 35 of 212 in 2009. 1,554 views.
Release Date:
2009-11-05
Secunia Advisory ID:
SA37261
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting or script insertion attacks, and by malicious users to bypass certain security restrictions, conduct script insertion attacks, manipulate certain data, conduct SQL injection attacks, or compromise a vulnerable system. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 36 of 212 in 2009. 2,027 views.
Release Date:
2009-11-02
Secunia Advisory ID:
SA37218
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for proftpd-dfsg
Vendor Patch. Secunia Advisory 37 of 212 in 2009. 1,853 views.
Release Date:
2009-11-02
Secunia Advisory ID:
SA37219
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for libhtml-parser-perl
Vendor Patch. Secunia Advisory 38 of 212 in 2009. 1,792 views.
Release Date:
2009-10-30
Secunia Advisory ID:
SA37209
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libhtml-parser-perl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 39 of 212 in 2009. 1,552 views.
Release Date:
2009-10-29
Secunia Advisory ID:
SA36957
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, manipulate certain data, or compromise a user's system. [Read More]


Debian update for expat
Vendor Patch. Secunia Advisory 40 of 212 in 2009. 1,492 views.
Release Date:
2009-10-29
Secunia Advisory ID:
SA37193
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for expat. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for nginx
Vendor Patch. Secunia Advisory 41 of 212 in 2009. 1,606 views.
Release Date:
2009-10-27
Secunia Advisory ID:
SA37110
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for nginx. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 42 of 212 in 2009. 2,013 views.
Release Date:
2009-10-26
Secunia Advisory ID:
SA37121
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Debian has issued an update for linux-2.6. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to disclose system and sensitive information or cause a DoS (Denial of Service), and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for advi
Vendor Patch. Secunia Advisory 43 of 212 in 2009. 1,504 views.
Release Date:
2009-10-26
Secunia Advisory ID:
SA37150
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for advi. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for smarty
Vendor Patch. Secunia Advisory 44 of 212 in 2009. 1,418 views.
Release Date:
2009-10-26
Secunia Advisory ID:
SA37140
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for smarty. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 45 of 212 in 2009. 2,110 views.
Release Date:
2009-10-26
Secunia Advisory ID:
SA37139
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion and SQL injection attacks. [Read More]


Debian update for mapserver
Vendor Patch. Secunia Advisory 46 of 212 in 2009. 1,436 views.
Release Date:
2009-10-23
Secunia Advisory ID:
SA37111
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mapserver. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially to compromise a vulnerable system. [Read More]


Debian update for bugzilla
Vendor Patch. Secunia Advisory 47 of 212 in 2009. 1,364 views.
Release Date:
2009-10-19
Secunia Advisory ID:
SA37064
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for bugzilla. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to conduct SQL injection attacks. [Read More]


Debian update for camlimages
Vendor Patch. Secunia Advisory 48 of 212 in 2009. 2,393 views.
Release Date:
2009-10-16
Secunia Advisory ID:
SA37067
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for camlimages. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for postgresql-ocaml
Vendor Patch. Secunia Advisory 49 of 212 in 2009. 2,871 views.
Release Date:
2009-10-15
Secunia Advisory ID:
SA37048
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for postgresql-ocaml. This fixes a weakness, which can potentially cause SQL injection vulnerabilities. [Read More]


Debian update for mysql-ocaml
Vendor Patch. Secunia Advisory 50 of 212 in 2009. 2,721 views.
Release Date:
2009-10-15
Secunia Advisory ID:
SA37047
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mysql-ocaml. This fixes a weakness, which can potentially cause SQL injection vulnerabilities. [Read More]


Debian update for pygresql
Vendor Patch. Secunia Advisory 51 of 212 in 2009. 2,656 views.
Release Date:
2009-10-15
Secunia Advisory ID:
SA37046
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for pygresql. This fixes a weakness, which can potentially cause SQL injection vulnerabilities [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 52 of 212 in 2009. 1,435 views.
Release Date:
2009-10-14
Secunia Advisory ID:
SA37026
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious users to disclose sensitive information and cause a DoS (Denial of Service). [Read More]


Debian update for kvm
Vendor Patch. Secunia Advisory 53 of 212 in 2009. 1,444 views.
Release Date:
2009-10-13
Secunia Advisory ID:
SA37018
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for python-django
Vendor Patch. Secunia Advisory 54 of 212 in 2009. 2,415 views.
Release Date:
2009-10-12
Secunia Advisory ID:
SA36968
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for python-django. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for wget
Vendor Patch. Secunia Advisory 55 of 212 in 2009. 1,720 views.
Release Date:
2009-10-09
Secunia Advisory ID:
SA36998
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for wget. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for graphicsmagick
Vendor Patch. Secunia Advisory 56 of 212 in 2009. 2,766 views.
Release Date:
2009-10-08
Secunia Advisory ID:
SA36946
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for graphicsmagick. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to disclose sensitive information or cause a DoS (Denial of Service), and by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Debian update for openswan
Vendor Patch. Secunia Advisory 57 of 212 in 2009. 2,077 views.
Release Date:
2009-10-05
Secunia Advisory ID:
SA36950
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openswan. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for strongswan
Vendor Patch. Secunia Advisory 58 of 212 in 2009. 2,184 views.
Release Date:
2009-10-05
Secunia Advisory ID:
SA36922
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for strongswan. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 59 of 212 in 2009. 2,520 views.
Release Date:
2009-10-05
Secunia Advisory ID:
SA36837
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
From local network
Short Description:
Debian has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 60 of 212 in 2009. 1,890 views.
Release Date:
2009-09-28
Secunia Advisory ID:
SA36882
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for opensaml and shibboleth-sp
Vendor Patch. Secunia Advisory 61 of 212 in 2009. 2,652 views.
Release Date:
2009-09-28
Secunia Advisory ID:
SA36876
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for opensaml and shibboleth-sp. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cause a DoS (Denial of Service), and potentially compromise an application using the library. [Read More]


Debian update for newt
Vendor Patch. Secunia Advisory 62 of 212 in 2009. 1,703 views.
Release Date:
2009-09-25
Secunia Advisory ID:
SA36871
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for newt. This fixes a vulnerability, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for xmltooling, opensaml2, and shibboleth-sp2
Vendor Patch. Secunia Advisory 63 of 212 in 2009. 2,754 views.
Release Date:
2009-09-25
Secunia Advisory ID:
SA36855
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xmltooling, opensaml2, and shibboleth-sp2. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cause a DoS (Denial of Service), and potentially compromise an application using the library. [Read More]


Debian update for cyrus-imapd-2.2 and kolab-cyrus-imapd
Vendor Patch. Secunia Advisory 64 of 212 in 2009. 1,690 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36846
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2 and kolab-cyrus-imapd. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for dovecot
Vendor Patch. Secunia Advisory 65 of 212 in 2009. 1,654 views.
Release Date:
2009-09-24
Secunia Advisory ID:
SA36842
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for dovecot. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for changetrack
Vendor Patch. Secunia Advisory 66 of 212 in 2009. 1,519 views.
Release Date:
2009-09-22
Secunia Advisory ID:
SA36797
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for changetrack. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for wxwidgets
Vendor Patch. Secunia Advisory 67 of 212 in 2009. 1,788 views.
Release Date:
2009-09-21
Secunia Advisory ID:
SA36784
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wxwidgets. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for icu
Vendor Patch. Secunia Advisory 68 of 212 in 2009. 1,681 views.
Release Date:
2009-09-17
Secunia Advisory ID:
SA36769
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for icu. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 69 of 212 in 2009. 2,680 views.
Release Date:
2009-09-16
Secunia Advisory ID:
SA36739
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a weakness, which can be exploited by malicious people to spoof certificates. [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 70 of 212 in 2009. 2,071 views.
Release Date:
2009-09-16
Secunia Advisory ID:
SA36717
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting and potentially script insertion attacks. [Read More]


Debian update for iceweasel
Vendor Patch. Secunia Advisory 71 of 212 in 2009. 1,800 views.
Release Date:
2009-09-15
Secunia Advisory ID:
SA36757
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 72 of 212 in 2009. 1,864 views.
Release Date:
2009-09-15
Secunia Advisory ID:
SA36692
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a vulnerable system. [Read More]


Debian update for nginx
Vendor Patch. Secunia Advisory 73 of 212 in 2009. 2,045 views.
Release Date:
2009-09-15
Secunia Advisory ID:
SA36758
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for nginx. This fixes a vulnerability, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for xapian-omega
Vendor Patch. Secunia Advisory 74 of 212 in 2009. 2,713 views.
Release Date:
2009-09-10
Secunia Advisory ID:
SA36693
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for xapian-omega. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for silc-client and silc-toolkit
Vendor Patch. Secunia Advisory 75 of 212 in 2009. 2,831 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36614
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for silc-client and silc-toolkit. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for cyrus-imapd-2.2
Vendor Patch. Secunia Advisory 76 of 212 in 2009. 2,325 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36632
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 77 of 212 in 2009. 2,355 views.
Release Date:
2009-09-07
Secunia Advisory ID:
SA36613
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for mysql-dfsg-5.0
Vendor Patch. Secunia Advisory 78 of 212 in 2009. 1,409 views.
Release Date:
2009-09-03
Secunia Advisory ID:
SA36515
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg-5.0. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for devscripts
Vendor Patch. Secunia Advisory 79 of 212 in 2009. 1,656 views.
Release Date:
2009-09-03
Secunia Advisory ID:
SA36514
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for devscripts. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for dnsmasq
Vendor Patch. Secunia Advisory 80 of 212 in 2009. 1,332 views.
Release Date:
2009-09-02
Secunia Advisory ID:
SA36567
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for dnsmasq. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for ikiwiki
Vendor Patch. Secunia Advisory 81 of 212 in 2009. 1,386 views.
Release Date:
2009-09-01
Secunia Advisory ID:
SA36539
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for ikiwiki. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 82 of 212 in 2009. 2,107 views.
Release Date:
2009-08-27
Secunia Advisory ID:
SA36435
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 83 of 212 in 2009. 2,849 views.
Release Date:
2009-08-27
Secunia Advisory ID:
SA36434
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security features or compromise a vulnerable system. [Read More]


Debian update for wordpress
Vendor Patch. Secunia Advisory 84 of 212 in 2009. 1,843 views.
Release Date:
2009-08-24
Secunia Advisory ID:
SA36316
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Brute force
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for wordpress. This fixes some vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges and compromise a vulnerable system, and by malicious people to guess automatically generated passwords and conduct script insertion attacks. [Read More]


Debian update for pidgin
Vendor Patch. Secunia Advisory 85 of 212 in 2009. 2,420 views.
Release Date:
2009-08-20
Secunia Advisory ID:
SA36402
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pidgin. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 86 of 212 in 2009. 1,555 views.
Release Date:
2009-08-20
Secunia Advisory ID:
SA36406
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 87 of 212 in 2009. 1,486 views.
Release Date:
2009-08-20
Secunia Advisory ID:
SA36375
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for kde4libs
Vendor Patch. Secunia Advisory 88 of 212 in 2009. 1,852 views.
Release Date:
2009-08-20
Secunia Advisory ID:
SA36411
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kde4libs. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for kdelibs
Vendor Patch. Secunia Advisory 89 of 212 in 2009. 1,631 views.
Release Date:
2009-08-20
Secunia Advisory ID:
SA36377
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kdelibs. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for zope2.10 and zope2.9
Vendor Patch. Secunia Advisory 90 of 212 in 2009. 1,638 views.
Release Date:
2009-08-17
Secunia Advisory ID:
SA36324
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From local network
Short Description:
Debian has issued updates for zope2.10 and zope2.9. These fix some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 91 of 212 in 2009. 1,434 views.
Release Date:
2009-08-17
Secunia Advisory ID:
SA36325
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Debian update for ruby1.8 and ruby1.9
Vendor Patch. Secunia Advisory 92 of 212 in 2009. 1,764 views.
Release Date:
2009-08-13
Secunia Advisory ID:
SA36298
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
DoS
Where:
From remote
Short Description:
Debian has issued an update for ruby1.8 and ruby1.9. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks and cause a DoS (Denial of Service). [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 93 of 212 in 2009. 1,453 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36211
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for imagemagick
Vendor Patch. Secunia Advisory 94 of 212 in 2009. 2,939 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36260
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system. [Read More]


Debian update for memcached
Vendor Patch. Secunia Advisory 95 of 212 in 2009. 3,415 views.
Release Date:
2009-08-10
Secunia Advisory ID:
SA36133
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for memcached. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 96 of 212 in 2009. 1,400 views.
Release Date:
2009-08-10
Secunia Advisory ID:
SA36225
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for mantis. This fixes a security issue, which can be exploited by malicious, local users to disclose sensitive information. [Read More]


Debian update for fetchmail
Vendor Patch. Secunia Advisory 97 of 212 in 2009. 2,932 views.
Release Date:
2009-08-10
Secunia Advisory ID:
SA36236
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 98 of 212 in 2009. 2,976 views.
Release Date:
2009-08-10
Secunia Advisory ID:
SA36224
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. [Read More]


Debian update for apr and apr-util
Vendor Patch. Secunia Advisory 99 of 212 in 2009. 1,546 views.
Release Date:
2009-08-10
Secunia Advisory ID:
SA36223
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for apr and apr-util. This fixes some vulnerabilities, which can potentially be exploited to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for camlimages
Vendor Patch. Secunia Advisory 100 of 212 in 2009. 1,357 views.
Release Date:
2009-08-10
Secunia Advisory ID:
SA36254
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for camlimages. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for gst-plugins-bad
Vendor Patch. Secunia Advisory 101 of 212 in 2009. 2,174 views.
Release Date:
2009-08-06
Secunia Advisory ID:
SA36183
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gst-plugins-bad. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for libmodplug
Vendor Patch. Secunia Advisory 102 of 212 in 2009. 2,202 views.
Release Date:
2009-08-05
Secunia Advisory ID:
SA36158
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libmodplug. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for znc
Vendor Patch. Secunia Advisory 103 of 212 in 2009. 1,513 views.
Release Date:
2009-08-03
Secunia Advisory ID:
SA36091
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for znc. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for xml-security-c
Vendor Patch. Secunia Advisory 104 of 212 in 2009. 1,810 views.
Release Date:
2009-08-03
Secunia Advisory ID:
SA36089
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for xml-security-c. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for kvm
Vendor Patch. Secunia Advisory 105 of 212 in 2009. 1,446 views.
Release Date:
2009-07-29
Secunia Advisory ID:
SA36055
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for kvm. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 106 of 212 in 2009. 2,835 views.
Release Date:
2009-07-29
Secunia Advisory ID:
SA36054
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of Service), or by malicious people to potentially compromise a user's system. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 107 of 212 in 2009. 1,457 views.
Release Date:
2009-07-29
Secunia Advisory ID:
SA36061
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for squid3
Vendor Patch. Secunia Advisory 108 of 212 in 2009. 1,507 views.
Release Date:
2009-07-29
Secunia Advisory ID:
SA36047
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid3. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openexr
Vendor Patch. Secunia Advisory 109 of 212 in 2009. 2,140 views.
Release Date:
2009-07-28
Secunia Advisory ID:
SA36032
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openexr. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for git-core
Vendor Patch. Secunia Advisory 110 of 212 in 2009. 1,494 views.
Release Date:
2009-07-27
Secunia Advisory ID:
SA35992
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for git-core. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 111 of 212 in 2009. 1,630 views.
Release Date:
2009-07-23
Secunia Advisory ID:
SA35961
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. [Read More]


Debian update for dbus
Vendor Patch. Secunia Advisory 112 of 212 in 2009. 1,612 views.
Release Date:
2009-07-20
Secunia Advisory ID:
SA35901
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for dbus. This fixes a weakness, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for gst-plugins-good0.10
Vendor Patch. Secunia Advisory 113 of 212 in 2009. 2,327 views.
Release Date:
2009-07-20
Secunia Advisory ID:
SA35897
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gst-plugins-good0.10. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for pulseaudio
Vendor Patch. Secunia Advisory 114 of 212 in 2009. 2,038 views.
Release Date:
2009-07-20
Secunia Advisory ID:
SA35896
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pulseaudio. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for fckeditor
Vendor Patch. Secunia Advisory 115 of 212 in 2009. 3,450 views.
Release Date:
2009-07-17
Secunia Advisory ID:
SA35833
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for fckeditor. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 116 of 212 in 2009. 3,617 views.
Release Date:
2009-07-16
Secunia Advisory ID:
SA35865
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes a weakness and a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 117 of 212 in 2009. 2,611 views.
Release Date:
2009-07-16
Secunia Advisory ID:
SA35866
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for dhcp3
Vendor Patch. Secunia Advisory 118 of 212 in 2009. 2,833 views.
Release Date:
2009-07-15
Secunia Advisory ID:
SA35830
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for dhcp3. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for djbdns
Vendor Patch. Secunia Advisory 119 of 212 in 2009. 2,191 views.
Release Date:
2009-07-14
Secunia Advisory ID:
SA35820
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for djbdns. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for camlimages
Vendor Patch. Secunia Advisory 120 of 212 in 2009. 2,034 views.
Release Date:
2009-07-14
Secunia Advisory ID:
SA35819
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for camlimages. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for icedove
Vendor Patch. Secunia Advisory 121 of 212 in 2009. 1,973 views.
Release Date:
2009-07-13
Secunia Advisory ID:
SA35759
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for icedove. This fixes a security issue an some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, conduct spoofing attacks, and potentially compromise a user's system. [Read More]


Debian update for sork-passwd-h3
Vendor Patch. Secunia Advisory 122 of 212 in 2009. 2,074 views.
Release Date:
2009-07-13
Secunia Advisory ID:
SA35769
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for sork-passwd-h3. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for ocsinventory-agent
Vendor Patch. Secunia Advisory 123 of 212 in 2009. 2,153 views.
Release Date:
2009-07-09
Secunia Advisory ID:
SA35768
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ocsinventory-agent. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for ipplan
Vendor Patch. Secunia Advisory 124 of 212 in 2009. 2,247 views.
Release Date:
2009-07-06
Secunia Advisory ID:
SA35714
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ipplan. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for eggdrop
Vendor Patch. Secunia Advisory 125 of 212 in 2009. 2,283 views.
Release Date:
2009-07-06
Secunia Advisory ID:
SA35690
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for eggdrop. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for nagios2 and nagios3
Vendor Patch. Secunia Advisory 126 of 212 in 2009. 3,000 views.
Release Date:
2009-07-06
Secunia Advisory ID:
SA35692
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for nagios2 and nagios3. This fixes a vulnerability, which can be exploited by malicious users to potentially compromise a vulnerable system. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 127 of 212 in 2009. 2,705 views.
Release Date:
2009-06-26
Secunia Advisory ID:
SA35585
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a vulnerable system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 128 of 212 in 2009. 2,356 views.
Release Date:
2009-06-26
Secunia Advisory ID:
SA35573
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to potentially compromise a user's system. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 129 of 212 in 2009. 1,439 views.
Release Date:
2009-06-23
Secunia Advisory ID:
SA35554
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for amule
Vendor Patch. Secunia Advisory 130 of 212 in 2009. 1,435 views.
Release Date:
2009-06-23
Secunia Advisory ID:
SA35538
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for amule. This fixes a security issue, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 131 of 212 in 2009. 3,030 views.
Release Date:
2009-06-19
Secunia Advisory ID:
SA35458
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for gforge. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 132 of 212 in 2009. 2,293 views.
Release Date:
2009-06-19
Secunia Advisory ID:
SA35446
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a vulnerable system. [Read More]


Debian update for ctorrent
Vendor Patch. Secunia Advisory 133 of 212 in 2009. 2,234 views.
Release Date:
2009-06-18
Secunia Advisory ID:
SA35499
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ctorrent. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 134 of 212 in 2009. 3,307 views.
Release Date:
2009-06-17
Secunia Advisory ID:
SA35453
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for apache2. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for libtorrent-rasterbar
Vendor Patch. Secunia Advisory 135 of 212 in 2009. 2,878 views.
Release Date:
2009-06-15
Secunia Advisory ID:
SA34241
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libtorrent-rasterbar. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for libsndfile
Vendor Patch. Secunia Advisory 136 of 212 in 2009. 2,378 views.
Release Date:
2009-06-15
Secunia Advisory ID:
SA35443
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libsndfile. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for evolution-data-server
Vendor Patch. Secunia Advisory 137 of 212 in 2009. 2,901 views.
Release Date:
2009-06-08
Secunia Advisory ID:
SA35357
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for evolution-data-server. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, and compromise a user's system. [Read More]


Debian update for apr-util
Vendor Patch. Secunia Advisory 138 of 212 in 2009. 3,605 views.
Release Date:
2009-06-05
Secunia Advisory ID:
SA35360
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr-util. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for cups and cupsys
Vendor Patch. Secunia Advisory 139 of 212 in 2009. 2,555 views.
Release Date:
2009-06-03
Secunia Advisory ID:
SA35322
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for cups and cupsys. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libapache-mod-jk
Vendor Patch. Secunia Advisory 140 of 212 in 2009. 2,762 views.
Release Date:
2009-06-03
Secunia Advisory ID:
SA29283
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for libapache-mod-jk. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. [Read More]


Debian update for cyrus-sasl2 and cyrus-sasl2-heimdal
Partial Fix. Secunia Advisory 141 of 212 in 2009. 2,404 views.
Release Date:
2009-06-02
Secunia Advisory ID:
SA35321
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cyrus-sasl2 and cyrus-sasl2-heimdal. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 142 of 212 in 2009. 2,494 views.
Release Date:
2009-06-02
Secunia Advisory ID:
SA35298
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for linux-2.6. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, and by malicious users and malicious people to cause a DoS and potentially execute arbitrary code. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 143 of 212 in 2009. 1,798 views.
Release Date:
2009-06-02
Secunia Advisory ID:
SA35282
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for cscope
Vendor Patch. Secunia Advisory 144 of 212 in 2009. 2,564 views.
Release Date:
2009-05-25
Secunia Advisory ID:
SA35214
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cscope. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for pidgin
Vendor Patch. Secunia Advisory 145 of 212 in 2009. 2,859 views.
Release Date:
2009-05-25
Secunia Advisory ID:
SA35215
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pidgin. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. [Read More]


Debian update for nsd
Vendor Patch. Secunia Advisory 146 of 212 in 2009. 1,562 views.
Release Date:
2009-05-21
Secunia Advisory ID:
SA35183
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for nsd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


Debian update for ipsec-tools
Vendor Patch. Secunia Advisory 147 of 212 in 2009. 2,263 views.
Release Date:
2009-05-21
Secunia Advisory ID:
SA35153
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ipsec-tools. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ntp
Vendor Patch. Secunia Advisory 148 of 212 in 2009. 3,057 views.
Release Date:
2009-05-20
Secunia Advisory ID:
SA35169
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ntp. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 149 of 212 in 2009. 3,008 views.
Release Date:
2009-05-20
Secunia Advisory ID:
SA35140
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Cross Site Scripting
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, session fixation, and phishing attacks. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 150 of 212 in 2009. 2,871 views.
Release Date:
2009-05-18
Secunia Advisory ID:
SA35121
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for linux-2.6. This fixes some weaknesses, security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, and disclose potentially sensitive information, by malicious users to bypass certain security restrictions, and by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for qemu
Vendor Patch. Secunia Advisory 151 of 212 in 2009. 2,581 views.
Release Date:
2009-05-12
Secunia Advisory ID:
SA35031
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for qemu. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 152 of 212 in 2009. 2,946 views.
Release Date:
2009-05-11
Secunia Advisory ID:
SA35042
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, security issues, and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, conduct cross-site scripting and cross-site request forgery attacks, and potentially compromise a user's system. [Read More]


Debian update for pango1.0
Vendor Patch. Secunia Advisory 153 of 212 in 2009. 2,595 views.
Release Date:
2009-05-11
Secunia Advisory ID:
SA35038
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pango1.0. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for libwmf
Vendor Patch. Secunia Advisory 154 of 212 in 2009. 2,627 views.
Release Date:
2009-05-08
Secunia Advisory ID:
SA35025
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for ldns
Vendor Patch. Secunia Advisory 155 of 212 in 2009. 2,183 views.
Release Date:
2009-05-07
Secunia Advisory ID:
SA35013
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ldns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 156 of 212 in 2009. 3,317 views.
Release Date:
2009-05-07
Secunia Advisory ID:
SA34991
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 157 of 212 in 2009. 2,404 views.
Release Date:
2009-05-07
Secunia Advisory ID:
SA34980
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks or to disclose potentially sensitive information. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 158 of 212 in 2009. 3,160 views.
Release Date:
2009-05-06
Secunia Advisory ID:
SA34959
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 159 of 212 in 2009. 2,465 views.
Release Date:
2009-05-06
Secunia Advisory ID:
SA34945
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 160 of 212 in 2009. 2,687 views.
Release Date:
2009-05-05
Secunia Advisory ID:
SA35007
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 161 of 212 in 2009. 3,293 views.
Release Date:
2009-05-05
Secunia Advisory ID:
SA34999
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for acpid
Vendor Patch. Secunia Advisory 162 of 212 in 2009. 2,174 views.
Release Date:
2009-05-04
Secunia Advisory ID:
SA34918
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for acpid. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 163 of 212 in 2009. 2,937 views.
Release Date:
2009-05-04
Secunia Advisory ID:
SA34970
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 164 of 212 in 2009. 2,717 views.
Release Date:
2009-05-01
Secunia Advisory ID:
SA34967
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for mysql-dfsg
Vendor Patch. Secunia Advisory 165 of 212 in 2009. 2,761 views.
Release Date:
2009-04-30
Secunia Advisory ID:
SA34907
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Debian has issued an update for mysql-dfsg. This fixes a security issue and a vulnerability, which can be exploited by malicious people to conduct script insertion attacks and by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for ffmpeg
Vendor Patch. Secunia Advisory 166 of 212 in 2009. 2,487 views.
Release Date:
2009-04-29
Secunia Advisory ID:
SA34905
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ffmpeg. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for apt
Vendor Patch. Secunia Advisory 167 of 212 in 2009. 2,128 views.
Release Date:
2009-04-27
Secunia Advisory ID:
SA34874
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for apt. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 168 of 212 in 2009. 2,107 views.
Release Date:
2009-04-23
Secunia Advisory ID:
SA34871
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for slurm-llnl
Vendor Patch. Secunia Advisory 169 of 212 in 2009. 1,443 views.
Release Date:
2009-04-22
Secunia Advisory ID:
SA34800
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for slurm-llnl. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian git-core Insecure File Ownership Security Issue
Vendor Patch. Secunia Advisory 170 of 212 in 2009. 1,778 views.
Release Date:
2009-04-22
Secunia Advisory ID:
SA34794
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Privilege escalation
Where:
Local system
Short Description:
Debian has acknowledged a security issue in git-core, which can be exploited by malicious, local users manipulate certain data and to potentially gain escalated privileges. [Read More]


Debian update for ejabberd
Vendor Patch. Secunia Advisory 171 of 212 in 2009. 2,607 views.
Release Date:
2009-04-17
Secunia Advisory ID:
SA34781
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 172 of 212 in 2009. 2,500 views.
Release Date:
2009-04-17
Secunia Advisory ID:
SA34722
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for udev
Vendor Patch. Secunia Advisory 173 of 212 in 2009. 3,401 views.
Release Date:
2009-04-16
Secunia Advisory ID:
SA34753
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for udev. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 174 of 212 in 2009. 2,501 views.
Release Date:
2009-04-16
Secunia Advisory ID:
SA34716
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Debian update for multipath-tools
Vendor Patch. Secunia Advisory 175 of 212 in 2009. 2,246 views.
Release Date:
2009-04-13
Secunia Advisory ID:
SA34694
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issues an update for device-mapper-multipath. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 176 of 212 in 2009. 3,198 views.
Release Date:
2009-04-13
Secunia Advisory ID:
SA34675
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially compromise a user's system. [Read More]


Debian update for roundup
Vendor Patch. Secunia Advisory 177 of 212 in 2009. 1,512 views.
Release Date:
2009-04-13
Secunia Advisory ID:
SA34683
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for roundup. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain data. [Read More]


Debian update for openafs
Vendor Patch. Secunia Advisory 178 of 212 in 2009. 2,343 views.
Release Date:
2009-04-13
Secunia Advisory ID:
SA34684
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for openafs. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system. [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 179 of 212 in 2009. 1,820 views.
Release Date:
2009-04-09
Secunia Advisory ID:
SA34645
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to potentially disclose sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Debian update for tunapie
Partial Fix. Secunia Advisory 180 of 212 in 2009. 2,329 views.
Release Date:
2009-04-08
Secunia Advisory ID:
SA34643
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for tunapie. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to compromise a user's system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 181 of 212 in 2009. 1,716 views.
Release Date:
2009-04-07
Secunia Advisory ID:
SA34584
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 182 of 212 in 2009. 2,046 views.
Release Date:
2009-04-06
Secunia Advisory ID:
SA34600
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes a security issue, which can be exploited by malicious users to disclose sensitive information. [Read More]


Debian update for icu
Vendor Patch. Secunia Advisory 183 of 212 in 2009. 1,942 views.
Release Date:
2009-04-03
Secunia Advisory ID:
SA34552
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for icu. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 184 of 212 in 2009. 2,573 views.
Release Date:
2009-04-01
Secunia Advisory ID:
SA34549
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes a weakness and a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for openswan
Vendor Patch. Secunia Advisory 185 of 212 in 2009. 2,496 views.
Release Date:
2009-03-31
Secunia Advisory ID:
SA34472
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for openswan. This fixes a vulnerability and a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for strongswan
Vendor Patch. Secunia Advisory 186 of 212 in 2009. 2,292 views.
Release Date:
2009-03-31
Secunia Advisory ID:
SA34494
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for strongswan. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for nss-ldapd
Vendor Patch. Secunia Advisory 187 of 212 in 2009. 2,012 views.
Release Date:
2009-03-31
Secunia Advisory ID:
SA34523
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for nss-ldapd. This fixes a security issue, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Debian update for auth2db
Vendor Patch. Secunia Advisory 188 of 212 in 2009. 2,085 views.
Release Date:
2009-03-30
Secunia Advisory ID:
SA34488
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for auth2db. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for systemtap
Vendor Patch. Secunia Advisory 189 of 212 in 2009. 2,292 views.
Release Date:
2009-03-26
Secunia Advisory ID:
SA34479
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for systemtap. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for webcit
Vendor Patch. Secunia Advisory 190 of 212 in 2009. 2,126 views.
Release Date:
2009-03-24
Secunia Advisory ID:
SA34457
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for webcit. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 191 of 212 in 2009. 2,876 views.
Release Date:
2009-03-23
Secunia Advisory ID:
SA34383
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks or compromise a user's system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 192 of 212 in 2009. 3,101 views.
Release Date:
2009-03-23
Secunia Advisory ID:
SA34394
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes a weakness, some security issues, and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, and gain escalated privileges. [Read More]


Debian update for glib2.0
Vendor Patch. Secunia Advisory 193 of 212 in 2009. 2,355 views.
Release Date:
2009-03-23
Secunia Advisory ID:
SA34404
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for glib2.0. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 194 of 212 in 2009. 1,652 views.
Release Date:
2009-03-23
Secunia Advisory ID:
SA34423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library. [Read More]


Debian update for ghostscript
Vendor Patch. Secunia Advisory 195 of 212 in 2009. 3,110 views.
Release Date:
2009-03-20
Secunia Advisory ID:
SA34381
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ghostscript. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for lcms
Vendor Patch. Secunia Advisory 196 of 212 in 2009. 3,051 views.
Release Date:
2009-03-20
Secunia Advisory ID:
SA34382
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update in lcms. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for weechat
Vendor Patch. Secunia Advisory 197 of 212 in 2009. 2,205 views.
Release Date:
2009-03-18
Secunia Advisory ID:
SA34328
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for weechat. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libtk-img
Vendor Patch. Secunia Advisory 198 of 212 in 2009. 2,407 views.
Release Date:
2009-03-17
Secunia Advisory ID:
SA34297
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libtk-img. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for yaws
Vendor Patch. Secunia Advisory 199 of 212 in 2009. 2,058 views.
Release Date:
2009-03-16
Secunia Advisory ID:
SA34239
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for yaws. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mldonkey
Vendor Patch. Secunia Advisory 200 of 212 in 2009. 2,106 views.
Release Date:
2009-03-16
Secunia Advisory ID:
SA34306
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mldonkey. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information [Read More]


Debian update for libsndfile
Vendor Patch. Secunia Advisory 201 of 212 in 2009. 2,414 views.
Release Date:
2009-03-16
Secunia Advisory ID:
SA34316
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libsndfile. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for psi
Vendor Patch. Secunia Advisory 202 of 212 in 2009. 2,110 views.
Release Date:
2009-03-16
Secunia Advisory ID:
SA34301
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for psi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for wesnoth
Vendor Patch. Secunia Advisory 203 of 212 in 2009. 2,359 views.
Release Date:
2009-03-13
Secunia Advisory ID:
SA34236
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wesnoth. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 204 of 212 in 2009. 2,881 views.
Release Date:
2009-03-12
Secunia Advisory ID:
SA34237
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 205 of 212 in 2009. 2,182 views.
Release Date:
2009-03-11
Secunia Advisory ID:
SA34231
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for znc
Vendor Patch. Secunia Advisory 206 of 212 in 2009. 2,186 views.
Release Date:
2009-03-11
Secunia Advisory ID:
SA34230
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for znc. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system. [Read More]


Debian update for opensc
Vendor Patch. Secunia Advisory 207 of 212 in 2009. 2,059 views.
Release Date:
2009-03-05
Secunia Advisory ID:
SA34120
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for opensc. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for gnutls
Vendor Patch. Secunia Advisory 208 of 212 in 2009. 1,782 views.
Release Date:
2009-03-02
Secunia Advisory ID:
SA34041
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Where:
From remote
Short Description:
Debian has issued a update for gnutls. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for dkim-milter
Vendor Patch. Secunia Advisory 209 of 212 in 2009. 1,772 views.
Release Date:
2009-03-02
Secunia Advisory ID:
SA34053
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for dkim-milter. This fixes a vulnerability, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks. [Read More]


Debian update for python-crypto
Vendor Patch. Secunia Advisory 210 of 212 in 2009. 1,667 views.
Release Date:
2009-02-27
Secunia Advisory ID:
SA34026
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for python-crypto. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for proftpd-dfsg
Vendor Patch. Secunia Advisory 211 of 212 in 2009. 1,854 views.
Release Date:
2009-02-26
Secunia Advisory ID:
SA34031
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for proftpd-dfsg. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for websvn
Vendor Patch. Secunia Advisory 212 of 212 in 2009. 15,131 views.
Release Date:
2009-02-16
Secunia Advisory ID:
SA33945
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for websvn. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 5.0 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability