Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 5.0

This vulnerability report for Debian GNU/Linux 5.0 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 5.0 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 556 Secunia advisories
1657 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 0% (2 of 556 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Debian GNU/Linux 5.0, with all vendor patches applied, is rated Highly critical .




172 Secunia Advisories in 2010

Secunia has issued a total of 172 Secunia advisories in 2010 for Debian GNU/Linux 5.0. Currently, 0% (0 out of 172) are marked as unpatched.

More information about the specific Secunia advisories affecting Debian GNU/Linux 5.0 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for wordpress
Vendor Patch. Secunia Advisory 1 of 172 in 2010. 1,792 views.
Release Date:
2010-12-30
Secunia Advisory ID:
SA42753
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for wordpress. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 2 of 172 in 2010. 1,681 views.
Release Date:
2010-12-27
Secunia Advisory ID:
SA42762
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 3 of 172 in 2010. 1,968 views.
Release Date:
2010-12-23
Secunia Advisory ID:
SA42667
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 4 of 172 in 2010. 2,225 views.
Release Date:
2010-12-22
Secunia Advisory ID:
SA42691
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes two vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for collectd
Vendor Patch. Secunia Advisory 5 of 172 in 2010. 1,650 views.
Release Date:
2010-12-14
Secunia Advisory ID:
SA42491
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for collectd. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 6 of 172 in 2010. 1,202 views.
Release Date:
2010-12-13
Secunia Advisory ID:
SA42574
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service). [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 7 of 172 in 2010. 1,198 views.
Release Date:
2010-12-13
Secunia Advisory ID:
SA42573
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for exim4
Vendor Patch. Secunia Advisory 8 of 172 in 2010. 2,074 views.
Release Date:
2010-12-12
Secunia Advisory ID:
SA42587
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for exim4. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 9 of 172 in 2010. 1,805 views.
Release Date:
2010-12-02
Secunia Advisory ID:
SA42429
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 10 of 172 in 2010. 1,605 views.
Release Date:
2010-12-02
Secunia Advisory ID:
SA42420
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 11 of 172 in 2010. 1,907 views.
Release Date:
2010-11-30
Secunia Advisory ID:
SA42378
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), gain escalated privileges, or to disclose certain system and potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 12 of 172 in 2010. 1,549 views.
Release Date:
2010-11-29
Secunia Advisory ID:
SA42392
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 13 of 172 in 2010. 1,974 views.
Release Date:
2010-11-23
Secunia Advisory ID:
SA42352
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 14 of 172 in 2010. 1,334 views.
Release Date:
2010-11-02
Secunia Advisory ID:
SA42026
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 15 of 172 in 2010. 1,202 views.
Release Date:
2010-11-02
Secunia Advisory ID:
SA42045
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes two vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for glibc
Vendor Patch. Secunia Advisory 16 of 172 in 2010. 1,391 views.
Release Date:
2010-10-25
Secunia Advisory ID:
SA41940
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for glibc. This fixes two weaknesses, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 17 of 172 in 2010. 1,286 views.
Release Date:
2010-10-20
Secunia Advisory ID:
SA41840
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Exposure of sensitive information
Exposure of system information
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks, disclose sensitive information, and perform certain actions with escalated privileges and by malicious people to conduct cross-site scripting attacks and disclose sensitive information. [Read More]


Debian update for poppler
Vendor Patch. Secunia Advisory 18 of 172 in 2010. 1,247 views.
Release Date:
2010-10-13
Secunia Advisory ID:
SA41793
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for poppler. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for postgresql-8.3
Vendor Patch. Secunia Advisory 19 of 172 in 2010. 1,224 views.
Release Date:
2010-10-13
Secunia Advisory ID:
SA41792
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for postgresql-8.3. This fixes a security issue, which can be exploited by malicious users to perform certain actions with escalated privileges. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 20 of 172 in 2010. 1,304 views.
Release Date:
2010-10-11
Secunia Advisory ID:
SA41739
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 21 of 172 in 2010. 1,188 views.
Release Date:
2010-10-07
Secunia Advisory ID:
SA41595
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for apr-util
Vendor Patch. Secunia Advisory 22 of 172 in 2010. 1,386 views.
Release Date:
2010-10-05
Secunia Advisory ID:
SA40905
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr-util. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 23 of 172 in 2010. 1,532 views.
Release Date:
2010-09-30
Secunia Advisory ID:
SA41633
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting, script insertion, cross-site request forgery, and SQL injection attacks. [Read More]


Debian update for git-core
Vendor Patch. Secunia Advisory 24 of 172 in 2010. 1,294 views.
Release Date:
2010-09-27
Secunia Advisory ID:
SA41582
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for git-core. This fixes a vulnerability, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for bzip2
Vendor Patch. Secunia Advisory 25 of 172 in 2010. 1,245 views.
Release Date:
2010-09-21
Secunia Advisory ID:
SA41511
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 26 of 172 in 2010. 1,355 views.
Release Date:
2010-09-21
Secunia Advisory ID:
SA41510
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes a weakness and some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious users and malicious people to bypass certain security restrictions. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 27 of 172 in 2010. 1,488 views.
Release Date:
2010-09-20
Secunia Advisory ID:
SA41483
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to disclose system information, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Debian update for squid3
Vendor Patch. Secunia Advisory 28 of 172 in 2010. 1,830 views.
Release Date:
2010-09-20
Secunia Advisory ID:
SA41534
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid3. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 29 of 172 in 2010. 1,549 views.
Release Date:
2010-09-17
Secunia Advisory ID:
SA41499
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for cvsnt
Vendor Patch. Secunia Advisory 30 of 172 in 2010. 1,745 views.
Release Date:
2010-09-14
Secunia Advisory ID:
SA41358
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for cvsnt. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for couchdb
Vendor Patch. Secunia Advisory 31 of 172 in 2010. 2,318 views.
Release Date:
2010-09-10
Secunia Advisory ID:
SA41383
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for couchdb. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 32 of 172 in 2010. 1,417 views.
Release Date:
2010-09-09
Secunia Advisory ID:
SA41331
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, or to compromise a user's system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 33 of 172 in 2010. 1,617 views.
Release Date:
2010-09-08
Secunia Advisory ID:
SA41315
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 34 of 172 in 2010. 2,184 views.
Release Date:
2010-09-07
Secunia Advisory ID:
SA41238
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for smbind
Vendor Patch. Secunia Advisory 35 of 172 in 2010. 1,245 views.
Release Date:
2010-09-06
Secunia Advisory ID:
SA41303
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for smbind. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for barnowl
Vendor Patch. Secunia Advisory 36 of 172 in 2010. 1,171 views.
Release Date:
2010-09-06
Secunia Advisory ID:
SA41260
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for barnowl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 37 of 172 in 2010. 1,243 views.
Release Date:
2010-09-01
Secunia Advisory ID:
SA41133
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 38 of 172 in 2010. 1,921 views.
Release Date:
2010-08-31
Secunia Advisory ID:
SA41105
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 39 of 172 in 2010. 2,426 views.
Release Date:
2010-08-30
Secunia Advisory ID:
SA41185
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 40 of 172 in 2010. 1,569 views.
Release Date:
2010-08-30
Secunia Advisory ID:
SA41186
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes multiple vulnerabilities and security issues, which can be exploited by malicious users to conduct SQL injection attacks, manipulate certain data, and compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks, HTTP redirect attacks, HTTP response splitting attacks, session fixation attacks, bypass certain security restrictions, and disclose potentially sensitive information. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 41 of 172 in 2010. 1,896 views.
Release Date:
2010-08-30
Secunia Advisory ID:
SA41235
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for zope-ldapuserfolder
Vendor Patch. Secunia Advisory 42 of 172 in 2010. 1,124 views.
Release Date:
2010-08-25
Secunia Advisory ID:
SA41054
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for zope-ldapuserfolder. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for lvm2
Vendor Patch. Secunia Advisory 43 of 172 in 2010. 1,490 views.
Release Date:
2010-08-23
Secunia Advisory ID:
SA41037
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for lvm2. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 44 of 172 in 2010. 1,717 views.
Release Date:
2010-08-23
Secunia Advisory ID:
SA41035
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for ghostscript
Vendor Patch. Secunia Advisory 45 of 172 in 2010. 1,789 views.
Release Date:
2010-08-20
Secunia Advisory ID:
SA40999
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ghostscript. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for lxr-cvs
Vendor Patch. Secunia Advisory 46 of 172 in 2010. 1,368 views.
Release Date:
2010-08-18
Secunia Advisory ID:
SA41010
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for lxr-cvs. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 47 of 172 in 2010. 2,462 views.
Release Date:
2010-08-13
Secunia Advisory ID:
SA40964
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes a vulnerability and a weakness, which can be exploited by malicious people to conduct cross-site request forgery attacks and cause a DoS (Denial of Service). [Read More]


Debian update for cabextract
Vendor Patch. Secunia Advisory 48 of 172 in 2010. 1,491 views.
Release Date:
2010-08-09
Secunia Advisory ID:
SA40854
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for cabextract. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for socat
Vendor Patch. Secunia Advisory 49 of 172 in 2010. 1,430 views.
Release Date:
2010-08-09
Secunia Advisory ID:
SA40914
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for socat. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 50 of 172 in 2010. 2,765 views.
Release Date:
2010-08-06
Secunia Advisory ID:
SA40860
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of sensitive information
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a weakness and two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and potentially compromise a vulnerable system. [Read More]


Debian update for wget
Vendor Patch. Secunia Advisory 51 of 172 in 2010. 1,838 views.
Release Date:
2010-08-05
Secunia Advisory ID:
SA40861
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for wget. This fixes a weakness, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for avahi
Vendor Patch. Secunia Advisory 52 of 172 in 2010. 1,360 views.
Release Date:
2010-08-04
Secunia Advisory ID:
SA40853
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for avahi. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for lftp
Vendor Patch. Secunia Advisory 53 of 172 in 2010. 1,423 views.
Release Date:
2010-08-04
Secunia Advisory ID:
SA40801
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for lftp. This fixes a weakness, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 54 of 172 in 2010. 2,336 views.
Release Date:
2010-08-03
Secunia Advisory ID:
SA40836
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 55 of 172 in 2010. 4,416 views.
Release Date:
2010-08-03
Secunia Advisory ID:
SA40834
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for ghostscript
Vendor Patch. Secunia Advisory 56 of 172 in 2010. 1,671 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40797
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ghostscript. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mapserver
Vendor Patch. Secunia Advisory 57 of 172 in 2010. 1,613 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40830
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for mapserver. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


MapServer "msTmpFile()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 58 of 172 in 2010. 2,243 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40790
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in MapServer, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for libmikmod
Vendor Patch. Secunia Advisory 59 of 172 in 2010. 2,449 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40799
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libmikmod. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for gmime2.2
Vendor Patch. Secunia Advisory 60 of 172 in 2010. 1,282 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40789
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gmime2.2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for kvirc
Vendor Patch. Secunia Advisory 61 of 172 in 2010. 1,348 views.
Release Date:
2010-08-02
Secunia Advisory ID:
SA40798
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for kvirc. This fixes a vulnerability, which can be exploited by malicious people to hijack IRC connections. [Read More]


Debian update for openldap
Vendor Patch. Secunia Advisory 62 of 172 in 2010. 1,588 views.
Release Date:
2010-07-30
Secunia Advisory ID:
SA40770
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for openldap. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for gnupg2
Vendor Patch. Secunia Advisory 63 of 172 in 2010. 1,741 views.
Release Date:
2010-07-28
Secunia Advisory ID:
SA40718
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gnupg2. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 64 of 172 in 2010. 1,498 views.
Release Date:
2010-07-28
Secunia Advisory ID:
SA40724
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some weaknesses and some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, conduct spoofing attacks, and compromise a user's system. [Read More]


Debian update for mlmmj
Vendor Patch. Secunia Advisory 65 of 172 in 2010. 2,325 views.
Release Date:
2010-07-21
Secunia Advisory ID:
SA40658
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mlmmj. This fixes a vulnerability, which can be exploited by malicious users to disclose system information and manipulate certain data. [Read More]


Debian update for ncompress
Vendor Patch. Secunia Advisory 66 of 172 in 2010. 1,930 views.
Release Date:
2010-07-21
Secunia Advisory ID:
SA40689
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 67 of 172 in 2010. 2,198 views.
Release Date:
2010-07-20
Secunia Advisory ID:
SA40547
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 68 of 172 in 2010. 1,427 views.
Release Date:
2010-07-15
Secunia Advisory ID:
SA40564
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for libmikmod
Vendor Patch. Secunia Advisory 69 of 172 in 2010. 1,645 views.
Release Date:
2010-07-15
Secunia Advisory ID:
SA40525
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libmikmod. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for znc
Vendor Patch. Secunia Advisory 70 of 172 in 2010. 2,151 views.
Release Date:
2010-07-12
Secunia Advisory ID:
SA40523
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for znc. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service) [Read More]


Debian update for python-cjson
Vendor Patch. Secunia Advisory 71 of 172 in 2010. 1,694 views.
Release Date:
2010-07-12
Secunia Advisory ID:
SA40500
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for python-cjson. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 72 of 172 in 2010. 1,364 views.
Release Date:
2010-07-05
Secunia Advisory ID:
SA40486
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and SQL injection attacks and bypass certain security restrictions. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 73 of 172 in 2010. 1,499 views.
Release Date:
2010-07-02
Secunia Advisory ID:
SA40423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kvirc
Vendor Patch. Secunia Advisory 74 of 172 in 2010. 2,237 views.
Release Date:
2010-06-28
Secunia Advisory ID:
SA40349
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kvirc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 75 of 172 in 2010. 1,546 views.
Release Date:
2010-06-28
Secunia Advisory ID:
SA40344
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or to compromise a user's system. [Read More]


Debian update for pmount
Vendor Patch. Secunia Advisory 76 of 172 in 2010. 1,470 views.
Release Date:
2010-06-18
Secunia Advisory ID:
SA40269
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pmount. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 77 of 172 in 2010. 2,149 views.
Release Date:
2010-06-17
Secunia Advisory ID:
SA40114
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 78 of 172 in 2010. 2,226 views.
Release Date:
2010-06-17
Secunia Advisory ID:
SA40221
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 79 of 172 in 2010. 1,362 views.
Release Date:
2010-06-14
Secunia Advisory ID:
SA40164
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes multiple vulnerabilities, which can be exploited by malicious users or malicious people to conduct SQL injection attacks. [Read More]


Debian update for pcsc-lite
Vendor Patch. Secunia Advisory 80 of 172 in 2010. 2,465 views.
Release Date:
2010-06-11
Secunia Advisory ID:
SA40140
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pcsc-lite. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for glibc and eglibc
Vendor Patch. Secunia Advisory 81 of 172 in 2010. 1,871 views.
Release Date:
2010-06-10
Secunia Advisory ID:
SA40121
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for glibc and eglibc. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for mysql-dfsg
Vendor Patch. Secunia Advisory 82 of 172 in 2010. 1,441 views.
Release Date:
2010-06-08
Secunia Advisory ID:
SA40035
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to manipulate certain data, by malicious users to bypass certain security restrictions or potentially compromise a vulnerable system, and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for zonecheck
Vendor Patch. Secunia Advisory 83 of 172 in 2010. 1,796 views.
Release Date:
2010-06-07
Secunia Advisory ID:
SA40083
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for zonecheck. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 84 of 172 in 2010. 2,605 views.
Release Date:
2010-06-07
Secunia Advisory ID:
SA40084
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 85 of 172 in 2010. 2,665 views.
Release Date:
2010-06-07
Secunia Advisory ID:
SA40086
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes some vulnerabilities, which can be exploited by malicious people to poison the DNS cache. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 86 of 172 in 2010. 3,539 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39830
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, and potentially gain escalated privileges, and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 87 of 172 in 2010. 2,311 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39849
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 88 of 172 in 2010. 2,881 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39938
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes multiple vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for postgresql-8.3
Vendor Patch. Secunia Advisory 89 of 172 in 2010. 3,194 views.
Release Date:
2010-05-25
Secunia Advisory ID:
SA39939
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for postgresql-8.3. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service), bypass certain security restrictions, and compromise a vulnerable system. [Read More]


Debian update for dvipng
Vendor Patch. Secunia Advisory 90 of 172 in 2010. 1,990 views.
Release Date:
2010-05-24
Secunia Advisory ID:
SA39914
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for dvipng. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for barnowl
Vendor Patch. Secunia Advisory 91 of 172 in 2010. 1,661 views.
Release Date:
2010-05-24
Secunia Advisory ID:
SA39908
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for barnowl. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for aria2
Vendor Patch. Secunia Advisory 92 of 172 in 2010. 1,837 views.
Release Date:
2010-05-18
Secunia Advisory ID:
SA39759
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for aria2. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 93 of 172 in 2010. 3,708 views.
Release Date:
2010-05-14
Secunia Advisory ID:
SA39731
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information. [Read More]


Debian update for libtheora
Vendor Patch. Secunia Advisory 94 of 172 in 2010. 1,800 views.
Release Date:
2010-05-12
Secunia Advisory ID:
SA39735
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libtheora. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 95 of 172 in 2010. 1,959 views.
Release Date:
2010-05-11
Secunia Advisory ID:
SA39789
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for mplayer
Vendor Patch. Secunia Advisory 96 of 172 in 2010. 1,729 views.
Release Date:
2010-05-11
Secunia Advisory ID:
SA39794
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for mplayer. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for iscsitarget
Vendor Patch. Secunia Advisory 97 of 172 in 2010. 1,883 views.
Release Date:
2010-05-07
Secunia Advisory ID:
SA39726
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for iscsitarget. This fixes multiple vulnerabilities which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mediawiki
Vendor Patch. Secunia Advisory 98 of 172 in 2010. 1,667 views.
Release Date:
2010-05-04
Secunia Advisory ID:
SA39581
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mediawiki. This fixes a vulnerability, which can be exploited by malicious users to conduct cross-site request forgery attacks. [Read More]


Debian update for squidguard
Vendor Patch. Secunia Advisory 99 of 172 in 2010. 1,896 views.
Release Date:
2010-05-03
Secunia Advisory ID:
SA39679
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for squidguard. This fixes some security issues, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 100 of 172 in 2010. 2,371 views.
Release Date:
2010-04-26
Secunia Advisory ID:
SA39572
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for pidgin
Vendor Patch. Secunia Advisory 101 of 172 in 2010. 1,956 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39509
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pidgin. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kdm
Vendor Patch. Secunia Advisory 102 of 172 in 2010. 1,822 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39506
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for kdm. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 103 of 172 in 2010. 2,534 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39501
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious people to gain access to potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 104 of 172 in 2010. 2,382 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39503
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some security issues, which can be exploited by malicious users to manipulate certain data and potentially perform certain actions with escalated privileges, and by malicious people to bypass certain security restrictions. [Read More]


Debian update for jasper
Vendor Patch. Secunia Advisory 105 of 172 in 2010. 1,634 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for jasper. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ejabberd
Vendor Patch. Secunia Advisory 106 of 172 in 2010. 2,510 views.
Release Date:
2010-04-16
Secunia Advisory ID:
SA39423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 107 of 172 in 2010. 1,802 views.
Release Date:
2010-04-12
Secunia Advisory ID:
SA39367
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 108 of 172 in 2010. 2,109 views.
Release Date:
2010-04-12
Secunia Advisory ID:
SA39251
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 109 of 172 in 2010. 1,200 views.
Release Date:
2010-04-07
Secunia Advisory ID:
SA39322
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes a vulnerability, which can be exploited by malicious users and malicious people to conduct SQL injection attacks. [Read More]


Debian update for imlib2
Vendor Patch. Secunia Advisory 110 of 172 in 2010. 1,810 views.
Release Date:
2010-04-06
Secunia Advisory ID:
SA39340
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 111 of 172 in 2010. 2,239 views.
Release Date:
2010-04-06
Secunia Advisory ID:
SA39327
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for netpbm-free
Vendor Patch. Secunia Advisory 112 of 172 in 2010. 1,294 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39268
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for netpbm-free. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 113 of 172 in 2010. 2,966 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39308
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 114 of 172 in 2010. 2,111 views.
Release Date:
2010-03-31
Secunia Advisory ID:
SA39190
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for icedove
Vendor Patch. Secunia Advisory 115 of 172 in 2010. 1,519 views.
Release Date:
2010-03-31
Secunia Advisory ID:
SA39184
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for icedove. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or to compromise a vulnerable system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 116 of 172 in 2010. 2,095 views.
Release Date:
2010-03-29
Secunia Advisory ID:
SA39087
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a security issue, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for mediawiki
Vendor Patch. Secunia Advisory 117 of 172 in 2010. 2,422 views.
Release Date:
2010-03-24
Secunia Advisory ID:
SA39022
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mediawiki. This fixes a vulnerability and a security issue, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions. [Read More]


Debian update for spamass-milter
Vendor Patch. Secunia Advisory 118 of 172 in 2010. 3,880 views.
Release Date:
2010-03-22
Secunia Advisory ID:
SA38956
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for spamass-milter. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for pango1.0
Vendor Patch. Secunia Advisory 119 of 172 in 2010. 2,102 views.
Release Date:
2010-03-22
Secunia Advisory ID:
SA39041
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pango1.0. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ikiwiki
Vendor Patch. Secunia Advisory 120 of 172 in 2010. 2,065 views.
Release Date:
2010-03-22
Secunia Advisory ID:
SA39048
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ikiwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 121 of 172 in 2010. 2,127 views.
Release Date:
2010-03-19
Secunia Advisory ID:
SA38930
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for drbd8
Vendor Patch. Secunia Advisory 122 of 172 in 2010. 1,389 views.
Release Date:
2010-03-17
Secunia Advisory ID:
SA38919
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for drbd8. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for pulseaudio
Vendor Patch. Secunia Advisory 123 of 172 in 2010. 1,678 views.
Release Date:
2010-03-17
Secunia Advisory ID:
SA38991
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for pulseaudio. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for drupal6
Vendor Patch. Secunia Advisory 124 of 172 in 2010. 1,412 views.
Release Date:
2010-03-15
Secunia Advisory ID:
SA38950
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal6. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and bypass certain security restrictions. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 125 of 172 in 2010. 2,209 views.
Release Date:
2010-03-12
Secunia Advisory ID:
SA38905
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for linux-2.6. This fixes a vulnerability and a security issue, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Debian update for egroupware
Vendor Patch. Secunia Advisory 126 of 172 in 2010. 1,813 views.
Release Date:
2010-03-12
Secunia Advisory ID:
SA38924
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for egroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 127 of 172 in 2010. 2,318 views.
Release Date:
2010-03-12
Secunia Advisory ID:
SA38903
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes multiple vulnerabilities with an unknown impact. [Read More]


Debian update for dpkg
Vendor Patch. Secunia Advisory 128 of 172 in 2010. 1,610 views.
Release Date:
2010-03-11
Secunia Advisory ID:
SA38907
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for dpkg. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system. [Read More]


Debian update for kvm
Vendor Patch. Secunia Advisory 129 of 172 in 2010. 1,424 views.
Release Date:
2010-03-11
Secunia Advisory ID:
SA38901
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for kvm. This fixes some vulnerabilities, which can be exploited by malicious, local users in a KVM guest to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Debian update for tdiary
Vendor Patch. Secunia Advisory 130 of 172 in 2010. 1,562 views.
Release Date:
2010-03-10
Secunia Advisory ID:
SA38868
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for tdiary. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 131 of 172 in 2010. 1,306 views.
Release Date:
2010-03-09
Secunia Advisory ID:
SA38892
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information and conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 132 of 172 in 2010. 1,460 views.
Release Date:
2010-03-04
Secunia Advisory ID:
SA38798
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 133 of 172 in 2010. 1,956 views.
Release Date:
2010-03-03
Secunia Advisory ID:
SA38762
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes multiple security issues, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 134 of 172 in 2010. 1,692 views.
Release Date:
2010-03-01
Secunia Advisory ID:
SA38811
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for samba. This fixes a weakness and a security issue, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and potentially gain escalated privileges. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 135 of 172 in 2010. 2,259 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38648
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes two vulnerabilities, where one has unknown impacts and the other can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for polipo
Vendor Patch. Secunia Advisory 136 of 172 in 2010. 1,716 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38647
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for polipo. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ffmpeg
Vendor Patch. Secunia Advisory 137 of 172 in 2010. 2,043 views.
Release Date:
2010-02-19
Secunia Advisory ID:
SA38643
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for ffmpeg. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. [Read More]


Debian update for xulrunner
Vendor Patch. Secunia Advisory 138 of 172 in 2010. 1,671 views.
Release Date:
2010-02-19
Secunia Advisory ID:
SA38644
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. [Read More]


Debian update for kdelibs
Vendor Patch. Secunia Advisory 139 of 172 in 2010. 1,741 views.
Release Date:
2010-02-18
Secunia Advisory ID:
SA38624
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 140 of 172 in 2010. 1,957 views.
Release Date:
2010-02-15
Secunia Advisory ID:
SA38549
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or compromise a user's system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 141 of 172 in 2010. 3,357 views.
Release Date:
2010-02-15
Secunia Advisory ID:
SA38492
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for the linux-2.6. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), manipulate certain data, disclose potentially sensitive information, bypass certain security issues, and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for mysql-dfsg-5.0
Vendor Patch. Secunia Advisory 142 of 172 in 2010. 2,493 views.
Release Date:
2010-02-15
Secunia Advisory ID:
SA38573
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg-5.0. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, malicious users to cause a DoS (Denial of Service), and malicious people to compromise a vulnerable system. [Read More]


Debian update for ajaxterm
Vendor Patch. Secunia Advisory 143 of 172 in 2010. 1,580 views.
Release Date:
2010-02-12
Secunia Advisory ID:
SA38560
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Brute force
Where:
From remote
Short Description:
Debian has issued an update for ajaxterm. This fixes a security issue, which can be exploited by malicious people to conduct hijacking attacks. [Read More]


Debian update for otrs2
Vendor Patch. Secunia Advisory 144 of 172 in 2010. 2,230 views.
Release Date:
2010-02-11
Secunia Advisory ID:
SA38544
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for otrs2. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for chrony
Vendor Patch. Secunia Advisory 145 of 172 in 2010. 2,805 views.
Release Date:
2010-02-05
Secunia Advisory ID:
SA38480
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for chrony. This fixes a security issue and a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for squid and squid3
Vendor Patch. Secunia Advisory 146 of 172 in 2010. 1,816 views.
Release Date:
2010-02-05
Secunia Advisory ID:
SA38429
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid and squid3. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for trac-git
Vendor Patch. Secunia Advisory 147 of 172 in 2010. 3,171 views.
Release Date:
2010-02-04
Secunia Advisory ID:
SA38325
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for trac-git. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for lighttpd
Vendor Patch. Secunia Advisory 148 of 172 in 2010. 1,266 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38361
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for lighttpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 149 of 172 in 2010. 1,628 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38360
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes a security issue and some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, and conduct SQL injection attacks and by malicious people to conduct cross-site request forgery attacks and bypass certain security restrictions. [Read More]


Debian update for fuse
Vendor Patch. Secunia Advisory 150 of 172 in 2010. 2,310 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38437
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
Debian has issued an update for fuse. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for qt4-x11
Vendor Patch. Secunia Advisory 151 of 172 in 2010. 2,095 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38447
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for qt4-x11. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 152 of 172 in 2010. 2,401 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38348
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


Debian update for libxerces2-java
Vendor Patch. Secunia Advisory 153 of 172 in 2010. 2,085 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38342
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libxerces2-java. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 154 of 172 in 2010. 1,908 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38314
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for hybserv
Vendor Patch. Secunia Advisory 155 of 172 in 2010. 1,849 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38350
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for hybserv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ircd-hybrid and ircd-ratbox
Vendor Patch. Secunia Advisory 156 of 172 in 2010. 3,296 views.
Release Date:
2010-01-29
Secunia Advisory ID:
SA38383
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ircd-hybrid and ircd-ratbox. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for lintian
Vendor Patch. Secunia Advisory 157 of 172 in 2010. 2,086 views.
Release Date:
2010-01-28
Secunia Advisory ID:
SA38375
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
System access
Where:
From remote
Short Description:
Debian has issued an update for lintian. This fixes multiple vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system, disclose system information, and manipulate certain data. [Read More]


Debian update for maildrop
Vendor Patch. Secunia Advisory 158 of 172 in 2010. 2,442 views.
Release Date:
2010-01-28
Secunia Advisory ID:
SA38374
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for maildrop. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 159 of 172 in 2010. 1,560 views.
Release Date:
2010-01-27
Secunia Advisory ID:
SA38297
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, or conduct cross-site scripting and SQL injection attacks. [Read More]


Debian update for python2.4 and python2.5
Vendor Patch. Secunia Advisory 160 of 172 in 2010. 1,568 views.
Release Date:
2010-01-26
Secunia Advisory ID:
SA38324
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Unknown
Where:
From remote
Short Description:
Debian has issued an update for python2.4 and python2.5. This fixes some vulnerabilities, where some have unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for dokuwiki
Vendor Patch. Secunia Advisory 161 of 172 in 2010. 1,496 views.
Release Date:
2010-01-25
Secunia Advisory ID:
SA38340
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for dokuwiki. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, and conduct cross-site request forgery attacks. [Read More]


Debian update for glibc and eglibc
Vendor Patch. Secunia Advisory 162 of 172 in 2010. 1,551 views.
Release Date:
2010-01-21
Secunia Advisory ID:
SA38238
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for glibc and eglibc. This fixes a security issue which can be exploited by malicious, local users to disclose sensitive information. [Read More]


Debian update for gzip
Vendor Patch. Secunia Advisory 163 of 172 in 2010. 2,926 views.
Release Date:
2010-01-21
Secunia Advisory ID:
SA38223
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gzip. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for audiofile
Vendor Patch. Secunia Advisory 164 of 172 in 2010. 1,323 views.
Release Date:
2010-01-18
Secunia Advisory ID:
SA38250
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for audiofile. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for libthai
Vendor Patch. Secunia Advisory 165 of 172 in 2010. 2,287 views.
Release Date:
2010-01-15
Secunia Advisory ID:
SA38213
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libthai. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 166 of 172 in 2010. 2,654 views.
Release Date:
2010-01-14
Secunia Advisory ID:
SA38181
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 167 of 172 in 2010. 1,944 views.
Release Date:
2010-01-13
Secunia Advisory ID:
SA38140
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for pdns-recursor
Vendor Patch. Secunia Advisory 168 of 172 in 2010. 1,458 views.
Release Date:
2010-01-11
Secunia Advisory ID:
SA38143
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for pdns-recursor. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks and potentially compromise a vulnerable system. [Read More]


Debian update for transmission
Vendor Patch. Secunia Advisory 169 of 172 in 2010. 2,809 views.
Release Date:
2010-01-08
Secunia Advisory ID:
SA37993
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for transmission. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 170 of 172 in 2010. 1,590 views.
Release Date:
2010-01-08
Secunia Advisory ID:
SA38013
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks. [Read More]


Debian update for phpldapadmin
Vendor Patch. Secunia Advisory 171 of 172 in 2010. 1,623 views.
Release Date:
2010-01-07
Secunia Advisory ID:
SA38110
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpldapadmin. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 172 of 172 in 2010. 1,429 views.
Release Date:
2010-01-04
Secunia Advisory ID:
SA38099
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct spoofing attacks. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 5.0 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability