Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 5.0

This vulnerability report for Debian GNU/Linux 5.0 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 5.0 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 556 Secunia advisories
1657 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 0% (2 of 556 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Debian GNU/Linux 5.0, with all vendor patches applied, is rated Highly critical .




153 Secunia Advisories in 2011

Secunia has issued a total of 153 Secunia advisories in 2011 for Debian GNU/Linux 5.0. Currently, 1% (2 out of 153) are marked as unpatched with the most severe being rated Highly critical

More information about the specific Secunia advisories affecting Debian GNU/Linux 5.0 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for openswan
Vendor Patch. Secunia Advisory 1 of 153 in 2011. 1,300 views.
Release Date:
2011-12-27
Secunia Advisory ID:
SA47342
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openswan. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for krb5 and krb5-appl
Vendor Patch. Secunia Advisory 2 of 153 in 2011. 2,399 views.
Release Date:
2011-12-27
Secunia Advisory ID:
SA47341
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5 and krb5-appl. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for jasper
Vendor Patch. Secunia Advisory 3 of 153 in 2011. 1,536 views.
Release Date:
2011-12-26
Secunia Advisory ID:
SA47353
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for jasper. This fixes two vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for heimdal
Vendor Patch. Secunia Advisory 4 of 153 in 2011. 2,288 views.
Release Date:
2011-12-26
Secunia Advisory ID:
SA47374
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for heimdal. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for inetutils
Vendor Patch. Secunia Advisory 5 of 153 in 2011. 2,276 views.
Release Date:
2011-12-26
Secunia Advisory ID:
SA47373
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for inetutils. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for unbound
Vendor Patch. Secunia Advisory 6 of 153 in 2011. 1,371 views.
Release Date:
2011-12-23
Secunia Advisory ID:
SA47326
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for unbound. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libsoup2.4
Vendor Patch. Secunia Advisory 7 of 153 in 2011. 1,186 views.
Release Date:
2011-12-22
Secunia Advisory ID:
SA47299
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for libsoup2.4. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for lighttpd
Vendor Patch. Secunia Advisory 8 of 153 in 2011. 1,562 views.
Release Date:
2011-12-21
Secunia Advisory ID:
SA47260
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for lighttpd. This fixes a weakness and a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, or cause a DoS (Denial of Service). [Read More]


Debian update for mediawiki
Vendor Patch. Secunia Advisory 9 of 153 in 2011. 1,098 views.
Release Date:
2011-12-20
Secunia Advisory ID:
SA47300
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mediawiki. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and bypass certain security restrictions. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 10 of 153 in 2011. 1,309 views.
Release Date:
2011-12-20
Secunia Advisory ID:
SA47273
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
DoS
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes a weakness and a vulnerability, which can be exploited by malicious people to disclose certain system information and cause a DoS (Denial of Service). [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 11 of 153 in 2011. 1,071 views.
Release Date:
2011-12-19
Secunia Advisory ID:
SA47259
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for dtc
Vendor Patch. Secunia Advisory 12 of 153 in 2011. 903 views.
Release Date:
2011-12-19
Secunia Advisory ID:
SA47230
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for dtc. This fixes multiple security issues and vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information and gain escalated privileges, and by malicious users to conduct script insertion attacks, conduct SQL injection attacks, and compromise a vulnerable system. [Read More]


Debian update for acpid
Vendor Patch. Secunia Advisory 13 of 153 in 2011. 1,198 views.
Release Date:
2011-12-12
Secunia Advisory ID:
SA47206
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for acpid. This fixes two security issues and a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Debian update for chasen
Vendor Patch. Secunia Advisory 14 of 153 in 2011. 1,065 views.
Release Date:
2011-12-08
Secunia Advisory ID:
SA47135
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for chasen. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 15 of 153 in 2011. 1,304 views.
Release Date:
2011-12-06
Secunia Advisory ID:
SA47091
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Spoofing
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, and compromise a vulnerable system. [Read More]


Debian update for evince
Vendor Patch. Secunia Advisory 16 of 153 in 2011. 1,270 views.
Release Date:
2011-12-05
Secunia Advisory ID:
SA47038
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for evince. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for clearsilver
Vendor Patch. Secunia Advisory 17 of 153 in 2011. 1,795 views.
Release Date:
2011-12-01
Secunia Advisory ID:
SA47016
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for clearsilver. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 18 of 153 in 2011. 951 views.
Release Date:
2011-12-01
Secunia Advisory ID:
SA47054
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for cups. This fixes two vulnerabilities, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for ldns
Vendor Patch. Secunia Advisory 19 of 153 in 2011. 1,062 views.
Release Date:
2011-11-25
Secunia Advisory ID:
SA46926
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ldns. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for puppet
Vendor Patch. Secunia Advisory 20 of 153 in 2011. 1,261 views.
Release Date:
2011-11-23
Secunia Advisory ID:
SA46934
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From local network
Short Description:
Debian has issued an update for puppet. This fixes a vulnerability, which can be exploited by malicious users to conduct spoofing attacks. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 21 of 153 in 2011. 1,365 views.
Release Date:
2011-11-22
Secunia Advisory ID:
SA46913
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 22 of 153 in 2011. 1,393 views.
Release Date:
2011-11-21
Secunia Advisory ID:
SA46921
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 23 of 153 in 2011. 1,597 views.
Release Date:
2011-11-17
Secunia Advisory ID:
SA46829
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for proftpd-dfsg
Vendor Patch. Secunia Advisory 24 of 153 in 2011. 903 views.
Release Date:
2011-11-16
Secunia Advisory ID:
SA46851
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for proftpd-dfsg. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to manipulate certain data. [Read More]


Debian update for iceweasel
Vendor Patch. Secunia Advisory 25 of 153 in 2011. 1,068 views.
Release Date:
2011-11-10
Secunia Advisory ID:
SA46769
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and compromise a user's system. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 26 of 153 in 2011. 1,065 views.
Release Date:
2011-11-08
Secunia Advisory ID:
SA46726
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 27 of 153 in 2011. 1,077 views.
Release Date:
2011-11-07
Secunia Advisory ID:
SA46729
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and cause a DoS (Denial of Service) and by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for man2html
Vendor Patch. Secunia Advisory 28 of 153 in 2011. 1,331 views.
Release Date:
2011-11-07
Secunia Advisory ID:
SA46760
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for man2html. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for python-django
Vendor Patch. Secunia Advisory 29 of 153 in 2011. 1,361 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46614
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Manipulation of data
Exposure of system information
DoS
Where:
From remote
Short Description:
Debian has issued an update for python-django. This fixes some vulnerabilities, which can be exploited by malicious people to disclose certain system information, manipulate certain data, conduct cache poisoning attacks, and cause a DoS (Denial of Service). [Read More]


Debian update for radvd
Vendor Patch. Secunia Advisory 30 of 153 in 2011. 998 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46639
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for radvd. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for phpldapadmin
Vendor Patch. Secunia Advisory 31 of 153 in 2011. 1,508 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46672
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for phpldapadmin. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 32 of 153 in 2011. 1,028 views.
Release Date:
2011-10-31
Secunia Advisory ID:
SA46640
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a security issue, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 33 of 153 in 2011. 1,068 views.
Release Date:
2011-10-25
Secunia Advisory ID:
SA46544
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 34 of 153 in 2011. 1,134 views.
Release Date:
2011-10-21
Secunia Advisory ID:
SA46482
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for moin
Vendor Patch. Secunia Advisory 35 of 153 in 2011. 882 views.
Release Date:
2011-10-11
Secunia Advisory ID:
SA46366
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for moin. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for dokuwiki
Vendor Patch. Secunia Advisory 36 of 153 in 2011. 868 views.
Release Date:
2011-10-10
Secunia Advisory ID:
SA46361
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for dokuwiki. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for cyrus-imapd-2.2
Vendor Patch. Secunia Advisory 37 of 153 in 2011. 1,094 views.
Release Date:
2011-10-07
Secunia Advisory ID:
SA46259
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2. This fixes two vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to bypass certain security restrictions. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 38 of 153 in 2011. 1,583 views.
Release Date:
2011-10-06
Secunia Advisory ID:
SA46274
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for puppet
Vendor Patch. Secunia Advisory 39 of 153 in 2011. 1,278 views.
Release Date:
2011-10-04
Secunia Advisory ID:
SA46243
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Manipulation of data
Where:
From local network
Short Description:
Debian has issued an update for puppet. This fixes multiple security issues and a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious users to compromise a vulnerable system. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 40 of 153 in 2011. 1,313 views.
Release Date:
2011-09-30
Secunia Advisory ID:
SA46116
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 41 of 153 in 2011. 1,488 views.
Release Date:
2011-09-26
Secunia Advisory ID:
SA46133
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for linux-2.6. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges, by malicious people with physical access to potentially compromise a vulnerable system, and by malicious people to cause a DoS and potentially compromise a vulnerable system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 42 of 153 in 2011. 843 views.
Release Date:
2011-09-14
Secunia Advisory ID:
SA45893
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a weakness, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 43 of 153 in 2011. 1,367 views.
Release Date:
2011-09-13
Secunia Advisory ID:
SA45961
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information and by malicious users to compromise a vulnerable system. [Read More]


Debian update for chromium-browser
Vendor Patch. Secunia Advisory 44 of 153 in 2011. 1,195 views.
Release Date:
2011-09-12
Secunia Advisory ID:
SA45963
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for chromium-browser. This fixes multiple vulnerabilities, where some have an unknown impact while others can be exploited by malicious people to disclose sensitive information and compromise a user's system. [Read More]


Debian update for squid3
Vendor Patch. Secunia Advisory 45 of 153 in 2011. 1,187 views.
Release Date:
2011-09-12
Secunia Advisory ID:
SA45965
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for squid3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for bcfg2
Vendor Patch. Secunia Advisory 46 of 153 in 2011. 1,262 views.
Release Date:
2011-09-09
Secunia Advisory ID:
SA45926
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for bcfg2. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 47 of 153 in 2011. 1,270 views.
Release Date:
2011-09-06
Secunia Advisory ID:
SA45839
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, HTTP response splitting, and SQL injection attacks. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 48 of 153 in 2011. 1,260 views.
Release Date:
2011-08-30
Secunia Advisory ID:
SA45696
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian icedove Multiple Vulnerabilities
Unpatched. Secunia Advisory 49 of 153 in 2011. 1,312 views.
Release Date:
2011-08-22
Secunia Advisory ID:
SA45688
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has acknowledged multiple vulnerabilities in icedove, which an be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 50 of 153 in 2011. 1,211 views.
Release Date:
2011-08-18
Secunia Advisory ID:
SA45612
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose certain sensitive information, and compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 51 of 153 in 2011. 1,133 views.
Release Date:
2011-08-15
Secunia Advisory ID:
SA45632
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for libxfont
Vendor Patch. Secunia Advisory 52 of 153 in 2011. 1,843 views.
Release Date:
2011-08-15
Secunia Advisory ID:
SA45599
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libxfont. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for isc-dhcp and dhcp3
Vendor Patch. Secunia Advisory 53 of 153 in 2011. 1,567 views.
Release Date:
2011-08-11
Secunia Advisory ID:
SA45595
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for isc-dhcp and dhcp3. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 54 of 153 in 2011. 1,218 views.
Release Date:
2011-08-08
Secunia Advisory ID:
SA44819
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct script insertion and cross-site scripting attacks and bypass certain security restrictions. [Read More]


Debian update for typo3-src
Vendor Patch. Secunia Advisory 55 of 153 in 2011. 1,304 views.
Release Date:
2011-08-08
Secunia Advisory ID:
SA45558
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for typo3-src. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, conduct script insertion attacks, disclose system information, and delete arbitrary files and by malicious people to enumerate user accounts, bypass certain security restrictions, and conduct cross-site scripting attacks. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 56 of 153 in 2011. 1,774 views.
Release Date:
2011-08-08
Secunia Advisory ID:
SA45488
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for samba. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and request forgery attacks. [Read More]


Debian update for libsndfile
Vendor Patch. Secunia Advisory 57 of 153 in 2011. 1,517 views.
Release Date:
2011-07-29
Secunia Advisory ID:
SA45388
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libsndfile. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for libpng
Vendor Patch. Secunia Advisory 58 of 153 in 2011. 1,841 views.
Release Date:
2011-07-29
Secunia Advisory ID:
SA45405
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 59 of 153 in 2011. 2,204 views.
Release Date:
2011-07-27
Secunia Advisory ID:
SA45315
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct cross-site scripting attacks and disclose sensitive information and by malicious users and malicious people to compromise a vulnerable system. [Read More]


Debian update for opensaml2
Vendor Patch. Secunia Advisory 60 of 153 in 2011. 1,136 views.
Release Date:
2011-07-26
Secunia Advisory ID:
SA45376
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for opensaml2. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for mapserver
Vendor Patch. Secunia Advisory 61 of 153 in 2011. 1,436 views.
Release Date:
2011-07-26
Secunia Advisory ID:
SA45368
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for mapserver. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and potentially compromise a vulnerable system. [Read More]


Debian update for opie
Vendor Patch. Secunia Advisory 62 of 153 in 2011. 1,615 views.
Release Date:
2011-07-21
Secunia Advisory ID:
SA45136
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for opie. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for libvirt
Vendor Patch. Secunia Advisory 63 of 153 in 2011. 1,091 views.
Release Date:
2011-07-20
Secunia Advisory ID:
SA45241
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for libvirt. This fixes two vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 64 of 153 in 2011. 960 views.
Release Date:
2011-07-18
Secunia Advisory ID:
SA45278
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 65 of 153 in 2011. 1,788 views.
Release Date:
2011-07-11
Secunia Advisory ID:
SA45201
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for xml-security-c
Vendor Patch. Secunia Advisory 66 of 153 in 2011. 1,434 views.
Release Date:
2011-07-11
Secunia Advisory ID:
SA45198
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for xml-security-c. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) in an application using the library. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 67 of 153 in 2011. 1,876 views.
Release Date:
2011-07-08
Secunia Advisory ID:
SA45149
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 68 of 153 in 2011. 1,828 views.
Release Date:
2011-07-06
Secunia Advisory ID:
SA45089
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for perl
Vendor Patch. Secunia Advisory 69 of 153 in 2011. 1,553 views.
Release Date:
2011-07-04
Secunia Advisory ID:
SA45121
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for perl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 70 of 153 in 2011. 1,691 views.
Release Date:
2011-07-04
Secunia Advisory ID:
SA45115
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 71 of 153 in 2011. 1,855 views.
Release Date:
2011-07-04
Secunia Advisory ID:
SA45088
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes a weakness, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 72 of 153 in 2011. 1,371 views.
Release Date:
2011-06-30
Secunia Advisory ID:
SA45062
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a weakness and multiple vulnerabilities, which can be exploited by malicious people to disclose system and potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. [Read More]


Debian update for perl
Vendor Patch. Secunia Advisory 73 of 153 in 2011. 1,303 views.
Release Date:
2011-06-21
Secunia Advisory ID:
SA44983
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for perl. This fixes a weakness, which can be exploited by malicious people to bypass certain security features. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 74 of 153 in 2011. 1,432 views.
Release Date:
2011-06-20
Secunia Advisory ID:
SA44975
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to conduct DNS cache poisoning attacks, disclose system information, disclose potentially sensitive information, bypass certain security restrictions, potentially gain escalated privileges, or cause a DoS (Denial of Service), by malicious people with physical access to potentially compromise a vulnerable system, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for movabletype-opensource
Vendor Patch. Secunia Advisory 75 of 153 in 2011. 1,057 views.
Release Date:
2011-06-17
Secunia Advisory ID:
SA44945
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for movabletype-opensource. This fixes two vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, and manipulate certain data. [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 76 of 153 in 2011. 1,177 views.
Release Date:
2011-06-15
Secunia Advisory ID:
SA44796
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for kolab-cyrus-imapd
Vendor Patch. Secunia Advisory 77 of 153 in 2011. 1,205 views.
Release Date:
2011-06-13
Secunia Advisory ID:
SA44913
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for kolab-cyrus-imapd. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for libxml2
Vendor Patch. Secunia Advisory 78 of 153 in 2011. 1,343 views.
Release Date:
2011-06-07
Secunia Advisory ID:
SA44817
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for oprofile
Vendor Patch. Secunia Advisory 79 of 153 in 2011. 1,392 views.
Release Date:
2011-06-07
Secunia Advisory ID:
SA44790
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for oprofile. This fixes a weakness, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for fontforge
Vendor Patch. Secunia Advisory 80 of 153 in 2011. 816 views.
Release Date:
2011-06-06
Secunia Advisory ID:
SA44804
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for fontforge. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 81 of 153 in 2011. 2,179 views.
Release Date:
2011-06-02
Secunia Advisory ID:
SA44633
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ejabberd
Vendor Patch. Secunia Advisory 82 of 153 in 2011. 1,720 views.
Release Date:
2011-06-01
Secunia Advisory ID:
SA44765
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ejabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for citadel
Vendor Patch. Secunia Advisory 83 of 153 in 2011. 1,220 views.
Release Date:
2011-06-01
Secunia Advisory ID:
SA44788
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for citadel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for rails
Vendor Patch. Secunia Advisory 84 of 153 in 2011. 896 views.
Release Date:
2011-06-01
Secunia Advisory ID:
SA44773
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for rails. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Debian update for unbound
Vendor Patch. Secunia Advisory 85 of 153 in 2011. 1,174 views.
Release Date:
2011-05-31
Secunia Advisory ID:
SA44687
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for unbound. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 86 of 153 in 2011. 1,665 views.
Release Date:
2011-05-30
Secunia Advisory ID:
SA44677
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 87 of 153 in 2011. 1,072 views.
Release Date:
2011-05-30
Secunia Advisory ID:
SA44662
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for cyrus-imapd-2.2
Vendor Patch. Secunia Advisory 88 of 153 in 2011. 1,580 views.
Release Date:
2011-05-26
Secunia Advisory ID:
SA44670
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cyrus-imapd-2.2. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for apr
Vendor Patch. Secunia Advisory 89 of 153 in 2011. 1,697 views.
Release Date:
2011-05-23
Secunia Advisory ID:
SA44613
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for apr
Vendor Patch. Secunia Advisory 90 of 153 in 2011. 1,228 views.
Release Date:
2011-05-16
Secunia Advisory ID:
SA44411
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for apr. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for postfix
Vendor Patch. Secunia Advisory 91 of 153 in 2011. 1,461 views.
Release Date:
2011-05-11
Secunia Advisory ID:
SA44506
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for postfix. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for zodb
Vendor Patch. Secunia Advisory 92 of 153 in 2011. 1,059 views.
Release Date:
2011-05-11
Secunia Advisory ID:
SA44488
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From local network
Short Description:
Debian has issued an update for zodb. This fixes two vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system. [Read More]


Debian update for libmodplug
Vendor Patch. Secunia Advisory 93 of 153 in 2011. 1,081 views.
Release Date:
2011-04-27
Secunia Advisory ID:
SA44339
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libmodplug. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 94 of 153 in 2011. 1,144 views.
Release Date:
2011-04-27
Secunia Advisory ID:
SA44340
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes multiple vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 95 of 153 in 2011. 1,179 views.
Release Date:
2011-04-21
Secunia Advisory ID:
SA44265
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. [Read More]


Debian update for request-tracker3.6 and request-tracker3.8
Vendor Patch. Secunia Advisory 96 of 153 in 2011. 1,001 views.
Release Date:
2011-04-20
Secunia Advisory ID:
SA44215
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for request-tracker3.6 and request-tracker3.8. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cross-site scripting attacks, and disclose potentially sensitive information and by malicious users to disclose potentially sensitive information, conduct SQL injection attacks, and compromise a vulnerable system. [Read More]


Debian update for xmlsec1
Vendor Patch. Secunia Advisory 97 of 153 in 2011. 1,545 views.
Release Date:
2011-04-19
Secunia Advisory ID:
SA44167
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xmlsec1. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for ikiwiki
Vendor Patch. Secunia Advisory 98 of 153 in 2011. 1,612 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44079
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ikiwiki. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for x11-xserver-utils
Vendor Patch. Secunia Advisory 99 of 153 in 2011. 1,428 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44082
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From local network
Short Description:
Debian has issued an update for x11-xserver-utils. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to compromise a vulnerable system. [Read More]


Debian update for dhcp3
Vendor Patch. Secunia Advisory 100 of 153 in 2011. 1,611 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44089
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for dhcp3. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 101 of 153 in 2011. 1,350 views.
Release Date:
2011-04-07
Secunia Advisory ID:
SA44019
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 102 of 153 in 2011. 1,115 views.
Release Date:
2011-04-07
Secunia Advisory ID:
SA44009
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 103 of 153 in 2011. 1,796 views.
Release Date:
2011-04-04
Secunia Advisory ID:
SA43934
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library. [Read More]


Debian update for mahara
Vendor Patch. Secunia Advisory 104 of 153 in 2011. 1,053 views.
Release Date:
2011-03-30
Secunia Advisory ID:
SA43878
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mahara. This fixes two vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for tomcat5.5
Vendor Patch. Secunia Advisory 105 of 153 in 2011. 1,655 views.
Release Date:
2011-03-30
Secunia Advisory ID:
SA43863
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for tomcat5.5. This fixes some weaknesses and vulnerabilities, which can be exploited by malicious users to disclose sensitive information and manipulate certain data and by malicious people to disclose sensitive information, manipulate certain data, and cause a DoS (Denial of Service). [Read More]


Debian update for imp4
Vendor Patch. Secunia Advisory 106 of 153 in 2011. 1,389 views.
Release Date:
2011-03-28
Secunia Advisory ID:
SA43896
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for imp4. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 107 of 153 in 2011. 2,849 views.
Release Date:
2011-03-24
Secunia Advisory ID:
SA43795
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes several vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 108 of 153 in 2011. 2,263 views.
Release Date:
2011-03-22
Secunia Advisory ID:
SA43499
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for maradns
Vendor Patch. Secunia Advisory 109 of 153 in 2011. 2,059 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43107
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for maradns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for php5
Vendor Patch. Secunia Advisory 110 of 153 in 2011. 1,775 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43449
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for php5. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to bypass certain security restrictions and cause a DoS (Denial of Service). [Read More]


Debian update for proftpd-dfsg
Vendor Patch. Secunia Advisory 111 of 153 in 2011. 1,497 views.
Release Date:
2011-03-15
Secunia Advisory ID:
SA43726
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for proftpd-dfsg. This fixes a vulnerability, which can be exploited by malicious users to manipulate certain data. [Read More]


Debian update for chromium-browser
Vendor Patch. Secunia Advisory 112 of 153 in 2011. 1,838 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43691
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
System access
Where:
From remote
Short Description:
Debian has issued an update for chromium-browser. This fixes some vulnerabilities, where some have an unknown impact while others can be exploited to potentially compromise a user's system. [Read More]


Debian webkit Multiple Vulnerabilities
Unpatched. Secunia Advisory 113 of 153 in 2011. 2,560 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43688
Solution Status:
Unpatched
Criticality:
Impact:
Unknown
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has acknowledged multiple vulnerabilities in webkit, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially compromise a user's system. [Read More]


Debian update for iceweasel and xulrunner
Vendor Patch. Secunia Advisory 114 of 153 in 2011. 2,169 views.
Release Date:
2011-03-10
Secunia Advisory ID:
SA43638
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel and xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, cross-site request forgery attacks, and compromise a user's system. [Read More]


Debian update for logwatch
Vendor Patch. Secunia Advisory 115 of 153 in 2011. 1,812 views.
Release Date:
2011-03-07
Secunia Advisory ID:
SA43622
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for logwatch. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for nbd
Vendor Patch. Secunia Advisory 116 of 153 in 2011. 1,998 views.
Release Date:
2011-03-07
Secunia Advisory ID:
SA43610
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Fedora has issued an update for nbd. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for subversion
Vendor Patch. Secunia Advisory 117 of 153 in 2011. 2,317 views.
Release Date:
2011-03-04
Secunia Advisory ID:
SA43583
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for subversion. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for dtc
Vendor Patch. Secunia Advisory 118 of 153 in 2011. 2,099 views.
Release Date:
2011-03-03
Secunia Advisory ID:
SA43523
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for dtc. This fixes multiple vulnerabilities, which can be exploited by malicious users and malicious people to bypass certain security restrictions and by malicious people to conduct SQL injection attacks. [Read More]


Debian update for cups
Vendor Patch. Secunia Advisory 119 of 153 in 2011. 2,065 views.
Release Date:
2011-03-02
Secunia Advisory ID:
SA43521
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cups. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks, disclose potentially sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 120 of 153 in 2011. 1,929 views.
Release Date:
2011-03-01
Secunia Advisory ID:
SA43482
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious users to cause a DoS and potentially compromise a vulnerable system. [Read More]


Debian update for pam-pgsql
Vendor Patch. Secunia Advisory 121 of 153 in 2011. 1,219 views.
Release Date:
2011-03-01
Secunia Advisory ID:
SA43505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pam-pgsql. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for avahi
Vendor Patch. Secunia Advisory 122 of 153 in 2011. 1,792 views.
Release Date:
2011-02-28
Secunia Advisory ID:
SA43465
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 123 of 153 in 2011. 1,621 views.
Release Date:
2011-02-23
Secunia Advisory ID:
SA43427
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Cross Site Scripting
Exposure of sensitive information
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes multiple vulnerabilities, which can be exploited by malicious users to perform certain actions with escalated privileges, disclose sensitive information, and hijack another user's session and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 124 of 153 in 2011. 1,383 views.
Release Date:
2011-02-22
Secunia Advisory ID:
SA43373
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mailman
Vendor Patch. Secunia Advisory 125 of 153 in 2011. 2,244 views.
Release Date:
2011-02-21
Secunia Advisory ID:
SA43294
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mailman. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for openafs
Vendor Patch. Secunia Advisory 126 of 153 in 2011. 2,093 views.
Release Date:
2011-02-18
Secunia Advisory ID:
SA43371
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for openafs. This fixes two vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS and potentially compromise a vulnerable system. [Read More]


Debian update for telepathy-gabble
Vendor Patch. Secunia Advisory 127 of 153 in 2011. 1,780 views.
Release Date:
2011-02-18
Secunia Advisory ID:
SA43404
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for telepathy-gabble. This fixes a vulnerability, which can be exploited by malicious people to conduct hijacking attacks. [Read More]


Debian update for shadow
Vendor Patch. Secunia Advisory 128 of 153 in 2011. 1,777 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43345
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Debian has issued an update for shadow. This fixes a vulnerability, which can be exploited by malicious, local users to manipulate certain data. [Read More]


Debian update for chromium-browser
Vendor Patch. Secunia Advisory 129 of 153 in 2011. 4,821 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43368
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for chromium-browser. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 130 of 153 in 2011. 1,484 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43391
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Debian update for ffmpeg-debian
Vendor Patch. Secunia Advisory 131 of 153 in 2011. 2,035 views.
Release Date:
2011-02-17
Secunia Advisory ID:
SA43323
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ffmpeg-debian. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for openjdk-6
Vendor Patch. Secunia Advisory 132 of 153 in 2011. 1,372 views.
Release Date:
2011-02-15
Secunia Advisory ID:
SA43290
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Manipulation of data
DoS
Where:
From remote
Short Description:
Debian has issued an update for openjdk-6. This fixes multiple vulnerabilities, where some have an unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service) and manipulate certain data. [Read More]


Debian update for cgiirc
Vendor Patch. Secunia Advisory 133 of 153 in 2011. 1,373 views.
Release Date:
2011-02-10
Secunia Advisory ID:
SA43270
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued a fix for cgiirc. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 134 of 153 in 2011. 1,829 views.
Release Date:
2011-02-04
Secunia Advisory ID:
SA43155
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for pcscd
Vendor Patch. Secunia Advisory 135 of 153 in 2011. 1,893 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43112
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pcscd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 136 of 153 in 2011. 2,062 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43138
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for exim4
Vendor Patch. Secunia Advisory 137 of 153 in 2011. 2,372 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43128
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for exim4. This fixes a weakness, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for linux-2.6
Vendor Patch. Secunia Advisory 138 of 153 in 2011. 2,006 views.
Release Date:
2011-01-31
Secunia Advisory ID:
SA43127
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for linux-2.6. This fixes some weaknesses, security issues, and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for hplip
Vendor Patch. Secunia Advisory 139 of 153 in 2011. 1,920 views.
Release Date:
2011-01-28
Secunia Advisory ID:
SA43083
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for hplip. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 140 of 153 in 2011. 3,068 views.
Release Date:
2011-01-27
Secunia Advisory ID:
SA43065
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system. [Read More]


Debian update for dbus
Vendor Patch. Secunia Advisory 141 of 153 in 2011. 2,170 views.
Release Date:
2011-01-21
Secunia Advisory ID:
SA42960
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for dbus. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for tor
Vendor Patch. Secunia Advisory 142 of 153 in 2011. 2,409 views.
Release Date:
2011-01-18
Secunia Advisory ID:
SA42905
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tor. This fixes a weakness and two vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for mydms
Vendor Patch. Secunia Advisory 143 of 153 in 2011. 1,741 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42900
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mydms. This fixes a vulnerability, which can be exploited by malicious users and malicious people to disclose sensitive information. [Read More]


Debian update for libsmi
Vendor Patch. Secunia Advisory 144 of 153 in 2011. 1,350 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42902
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libsmi. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 145 of 153 in 2011. 1,822 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42910
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for pimd
Vendor Patch. Secunia Advisory 146 of 153 in 2011. 1,722 views.
Release Date:
2011-01-17
Secunia Advisory ID:
SA42793
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pimd. This fixes two security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for mysql-dfsg-5.0
Vendor Patch. Secunia Advisory 147 of 153 in 2011. 3,263 views.
Release Date:
2011-01-14
Secunia Advisory ID:
SA42875
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg-5.0. This fixes multiple vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for dpkg
Vendor Patch. Secunia Advisory 148 of 153 in 2011. 2,041 views.
Release Date:
2011-01-07
Secunia Advisory ID:
SA42826
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for dpkg. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data or compromise a vulnerable system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 149 of 153 in 2011. 3,032 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42811
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes two vulnerabilities, which can be exploited by malicious people to manipulate certain data and bypass certain security restrictions. [Read More]


Debian update for libapache2-mod-fcgid
Vendor Patch. Secunia Advisory 150 of 153 in 2011. 1,992 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42815
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libapache2-mod-fcgid. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Debian update for nss
Vendor Patch. Secunia Advisory 151 of 153 in 2011. 2,352 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42808
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for nss. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 152 of 153 in 2011. 2,647 views.
Release Date:
2011-01-06
Secunia Advisory ID:
SA42816
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 153 of 153 in 2011. 2,210 views.
Release Date:
2011-01-03
Secunia Advisory ID:
SA42725
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes a vulnerability and two weaknesses, which can be exploited by malicious people to conduct spoofing and cross-site scripting attack and disclose system information. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 5.0 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer