Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 3.1

This vulnerability report for Debian GNU/Linux 3.1 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 3.1 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 639 Secunia advisories
1712 Vulnerabilities

Monitor Product Receive alerts for this product





181 Secunia Advisories in 2005

Secunia has issued a total of 181 Secunia advisories in 2005 for Debian GNU/Linux 3.1. Currently, 1% (1 out of 181) are marked as unpatched with the most severe being rated Less critical

More information about the specific Secunia advisories affecting Debian GNU/Linux 3.1 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for ketm
Vendor Patch. Secunia Advisory 1 of 181 in 2005. 8,306 views.
Release Date:
2005-12-27
Secunia Advisory ID:
SA18225
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Steve Kemp has reported a vulnerability in ketm, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for tkdiff
Vendor Patch. Secunia Advisory 2 of 181 in 2005. 8,640 views.
Release Date:
2005-12-27
Secunia Advisory ID:
SA18215
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for tkdiff. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for dhis-tools-dns
Vendor Patch. Secunia Advisory 3 of 181 in 2005. 9,335 views.
Release Date:
2005-12-27
Secunia Advisory ID:
SA18228
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for dhis-tools-dns. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for phpbb2
Vendor Patch. Secunia Advisory 4 of 181 in 2005. 10,581 views.
Release Date:
2005-12-22
Secunia Advisory ID:
SA18098
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for phpbb2. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, script insertion, and SQL injection attacks, bypass certain security restrictions, and compromise a vulnerable system. [Read More]


Debian update for nbd
Vendor Patch. Secunia Advisory 5 of 181 in 2005. 7,805 views.
Release Date:
2005-12-22
Secunia Advisory ID:
SA18171
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for nbd. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for dropbear
Vendor Patch. Secunia Advisory 6 of 181 in 2005. 8,321 views.
Release Date:
2005-12-19
Secunia Advisory ID:
SA18109
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for dropbear. This fixes a vulnerability, which potentially can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for kernel-source-2.4.27
Vendor Patch. Secunia Advisory 7 of 181 in 2005. 10,235 views.
Release Date:
2005-12-15
Secunia Advisory ID:
SA18059
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.4.27. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, to cause a DoS (Denial of Service) and potentially to gain escalated privileges, or by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kernel-source-2.6.8
Vendor Patch. Secunia Advisory 8 of 181 in 2005. 12,136 views.
Release Date:
2005-12-15
Secunia Advisory ID:
SA18056
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.6.8. This fixes some vulnerabilities, which can be exploited by malicious, local users with an unknown impact, to cause a DoS (Denial of Service), to gain knowledge of potentially sensitive and to gain escalated privileges, or by malicious people to bypass certain security restrictions and potentially to cause a DoS. [Read More]


Debian update for ethereal
Vendor Patch. Secunia Advisory 9 of 181 in 2005. 8,284 views.
Release Date:
2005-12-13
Secunia Advisory ID:
SA18012
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ethereal. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for curl
Vendor Patch. Secunia Advisory 10 of 181 in 2005. 9,366 views.
Release Date:
2005-12-12
Secunia Advisory ID:
SA17965
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
System access
Where:
From remote
Short Description:
Debian has issued an update for curl. This fixes two vulnerabilities, where one has an unknown impact and another can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for osh
Vendor Patch. Secunia Advisory 11 of 181 in 2005. 9,902 views.
Release Date:
2005-12-09
Secunia Advisory ID:
SA17967
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for osh. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian courier Deactivated Account Authentication Bypass
Vendor Patch. Secunia Advisory 12 of 181 in 2005. 7,943 views.
Release Date:
2005-12-08
Secunia Advisory ID:
SA17919
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Patrick Cheong Shu Yang has reported a security issue in courier, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Debian update for inkscape
Vendor Patch. Secunia Advisory 13 of 181 in 2005. 8,552 views.
Release Date:
2005-12-07
Secunia Advisory ID:
SA17882
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for inkscape. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and by malicious people to potentially compromise a user's system. [Read More]


Debian update for helix-player
Vendor Patch. Secunia Advisory 14 of 181 in 2005. 9,837 views.
Release Date:
2005-12-02
Secunia Advisory ID:
SA17860
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for helix-player. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for horde2
Vendor Patch. Secunia Advisory 15 of 181 in 2005. 8,704 views.
Release Date:
2005-12-01
Secunia Advisory ID:
SA17794
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde2. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for gdk-pixbuf
Vendor Patch. Secunia Advisory 16 of 181 in 2005. 8,436 views.
Release Date:
2005-12-01
Secunia Advisory ID:
SA17791
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gdk-pixbuf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for centericq
Vendor Patch. Secunia Advisory 17 of 181 in 2005. 8,270 views.
Release Date:
2005-11-30
Secunia Advisory ID:
SA17818
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for centericq. This fixes a weakness, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gtk+2.0
Vendor Patch. Secunia Advisory 18 of 181 in 2005. 9,166 views.
Release Date:
2005-11-30
Secunia Advisory ID:
SA17770
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gtk+2.0. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for zope2.7
Vendor Patch. Secunia Advisory 19 of 181 in 2005. 8,723 views.
Release Date:
2005-11-24
Secunia Advisory ID:
SA17676
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
Debian has issued an update for zope. This fixes a vulnerability with an unknown impact. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 20 of 181 in 2005. 8,164 views.
Release Date:
2005-11-23
Secunia Advisory ID:
SA17599
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for sylpheed
Vendor Patch. Secunia Advisory 21 of 181 in 2005. 8,552 views.
Release Date:
2005-11-23
Secunia Advisory ID:
SA17678
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for sylpheed. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for netpbm-free
Vendor Patch. Secunia Advisory 22 of 181 in 2005. 8,281 views.
Release Date:
2005-11-22
Secunia Advisory ID:
SA17671
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for netpbm-free. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 23 of 181 in 2005. 9,920 views.
Release Date:
2005-11-22
Secunia Advisory ID:
SA17654
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, conduct cross-site scripting and SQL injection attacks, and compromise a vulnerable system. [Read More]


Debian update for gnump3d
Vendor Patch. Secunia Advisory 24 of 181 in 2005. 9,146 views.
Release Date:
2005-11-21
Secunia Advisory ID:
SA17656
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for gnump3d. This fixes two vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges, and by malicious people with an unknown impact. [Read More]


Debian update for unzip
Vendor Patch. Secunia Advisory 25 of 181 in 2005. 10,767 views.
Release Date:
2005-11-21
Secunia Advisory ID:
SA17653
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for unzip. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for xmail
Vendor Patch. Secunia Advisory 26 of 181 in 2005. 8,055 views.
Release Date:
2005-11-21
Secunia Advisory ID:
SA17637
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for xmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for fetchmail
Vendor Patch. Secunia Advisory 27 of 181 in 2005. 9,379 views.
Release Date:
2005-11-18
Secunia Advisory ID:
SA17631
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of certain sensitive information. [Read More]


Debian update for egroupware
Vendor Patch. Secunia Advisory 28 of 181 in 2005. 10,171 views.
Release Date:
2005-11-18
Secunia Advisory ID:
SA17643
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for egroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, manipulate certain information, and bypass certain security restrictions. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 29 of 181 in 2005. 8,596 views.
Release Date:
2005-11-17
Secunia Advisory ID:
SA17616
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and manipulate certain information. [Read More]


Debian update for uim
Vendor Patch. Secunia Advisory 30 of 181 in 2005. 6,719 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17572
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for uim. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for abiword
Vendor Patch. Secunia Advisory 31 of 181 in 2005. 9,430 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17551
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for abiword. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for acidlab
Vendor Patch. Secunia Advisory 32 of 181 in 2005. 10,041 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17558
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for acidlab. This fixes some vulnerabilities, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for linux-ftpd-ssl
Vendor Patch. Secunia Advisory 33 of 181 in 2005. 8,141 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17586
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for linux-ftpd-ssl. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for phpsysinfo
Vendor Patch. Secunia Advisory 34 of 181 in 2005. 8,941 views.
Release Date:
2005-11-15
Secunia Advisory ID:
SA17584
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpsysinfo. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and manipulate certain information. [Read More]


Debian update for awstats
Vendor Patch. Secunia Advisory 35 of 181 in 2005. 9,294 views.
Release Date:
2005-11-10
Secunia Advisory ID:
SA17463
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for awstats. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for gpsdrive
Vendor Patch. Secunia Advisory 36 of 181 in 2005. 9,251 views.
Release Date:
2005-11-09
Secunia Advisory ID:
SA17477
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gpsdrive. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Debian update for libungif4
Vendor Patch. Secunia Advisory 37 of 181 in 2005. 9,381 views.
Release Date:
2005-11-09
Secunia Advisory ID:
SA17497
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libungif4. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for chmlib
Vendor Patch. Secunia Advisory 38 of 181 in 2005. 8,245 views.
Release Date:
2005-11-08
Secunia Advisory ID:
SA17494
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for chmlib. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 39 of 181 in 2005. 8,923 views.
Release Date:
2005-11-08
Secunia Advisory ID:
SA17501
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a vulnerable system. [Read More]


Debian update for openvpn
Vendor Patch. Secunia Advisory 40 of 181 in 2005. 11,589 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17452
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openvpn. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for thttpd
Vendor Patch. Secunia Advisory 41 of 181 in 2005. 8,748 views.
Release Date:
2005-11-07
Secunia Advisory ID:
SA17472
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for thttpd. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 42 of 181 in 2005. 8,623 views.
Release Date:
2005-11-02
Secunia Advisory ID:
SA17337
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information. [Read More]


Debian update for gallery
Vendor Patch. Secunia Advisory 43 of 181 in 2005. 8,407 views.
Release Date:
2005-11-02
Secunia Advisory ID:
SA17367
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for gallery. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Debian update for netpbm-free
Vendor Patch. Secunia Advisory 44 of 181 in 2005. 8,755 views.
Release Date:
2005-10-28
Secunia Advisory ID:
SA17357
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for netpbm-free. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


Debian update for gnump3d
Vendor Patch. Secunia Advisory 45 of 181 in 2005. 9,430 views.
Release Date:
2005-10-28
Secunia Advisory ID:
SA17355
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for gnump3d. This fixes two vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and directory traversal attacks. [Read More]


Debian update for lynx-ssl
Vendor Patch. Secunia Advisory 46 of 181 in 2005. 10,524 views.
Release Date:
2005-10-28
Secunia Advisory ID:
SA17360
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for lynx-ssl. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for lynx
Vendor Patch. Secunia Advisory 47 of 181 in 2005. 9,616 views.
Release Date:
2005-10-27
Secunia Advisory ID:
SA17340
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for lynx. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for net-snmp
Vendor Patch. Secunia Advisory 48 of 181 in 2005. 10,203 views.
Release Date:
2005-10-27
Secunia Advisory ID:
SA17343
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 49 of 181 in 2005. 9,501 views.
Release Date:
2005-10-27
Secunia Advisory ID:
SA17344
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for koffice
Vendor Patch. Secunia Advisory 50 of 181 in 2005. 8,290 views.
Release Date:
2005-10-26
Secunia Advisory ID:
SA17332
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issue an update for koffice. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for libgda2
Vendor Patch. Secunia Advisory 51 of 181 in 2005. 8,636 views.
Release Date:
2005-10-26
Secunia Advisory ID:
SA17339
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libgda2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 52 of 181 in 2005. 9,260 views.
Release Date:
2005-10-26
Secunia Advisory ID:
SA17322
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for eric
Vendor Patch. Secunia Advisory 53 of 181 in 2005. 7,748 views.
Release Date:
2005-10-21
Secunia Advisory ID:
SA17269
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for eric. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 54 of 181 in 2005. 14,020 views.
Release Date:
2005-10-21
Secunia Advisory ID:
SA17284
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for module-assistant
Vendor Patch. Secunia Advisory 55 of 181 in 2005. 8,507 views.
Release Date:
2005-10-21
Secunia Advisory ID:
SA17267
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for module-assistant. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 56 of 181 in 2005. 11,472 views.
Release Date:
2005-10-20
Secunia Advisory ID:
SA17263
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for hylafax
Vendor Patch. Secunia Advisory 57 of 181 in 2005. 9,217 views.
Release Date:
2005-10-13
Secunia Advisory ID:
SA17187
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for hylafax. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 58 of 181 in 2005. 8,451 views.
Release Date:
2005-10-12
Secunia Advisory ID:
SA17162
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for ruby
Vendor Patch. Secunia Advisory 59 of 181 in 2005. 8,351 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17129
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for uw-imap
Vendor Patch. Secunia Advisory 60 of 181 in 2005. 8,923 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17148
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for uw-imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for xli
Vendor Patch. Secunia Advisory 61 of 181 in 2005. 8,855 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17139
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xli. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for xloadimage
Vendor Patch. Secunia Advisory 62 of 181 in 2005. 8,831 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17140
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xloadimage. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for tcpdump
Vendor Patch. Secunia Advisory 63 of 181 in 2005. 8,569 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17118
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for tcpdump. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for graphviz
Vendor Patch. Secunia Advisory 64 of 181 in 2005. 8,435 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17125
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for graphviz. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for ethereal
Vendor Patch. Secunia Advisory 65 of 181 in 2005. 8,724 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17102
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for up-imapproxy
Vendor Patch. Secunia Advisory 66 of 181 in 2005. 8,827 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17120
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for up-imapproxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for openvpn
Vendor Patch. Secunia Advisory 67 of 181 in 2005. 9,674 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17103
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for openvpn. This fixes some vulnerabilities, which can be exploited by malicious people and users to cause a DoS (Denial of Service). [Read More]


Debian update for py2play
Vendor Patch. Secunia Advisory 68 of 181 in 2005. 7,886 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17106
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for py2play. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for weex
Vendor Patch. Secunia Advisory 69 of 181 in 2005. 9,098 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17081
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for weex. This fixes a vulnerability, which potentially can be exploited by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Debian update for cpio
Vendor Patch. Secunia Advisory 70 of 181 in 2005. 10,319 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17123
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cpio. This fixes a vulnerability, which can be exploited by malicious people to cause files to be unpacked to arbitrary locations on a user's system. [Read More]


Debian update for shorewall
Vendor Patch. Secunia Advisory 71 of 181 in 2005. 9,056 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17110
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
Debian has issued an update for shorewall. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for masqmail
Vendor Patch. Secunia Advisory 72 of 181 in 2005. 9,488 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17109
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for masqmail. This fixes two vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for dia
Vendor Patch. Secunia Advisory 73 of 181 in 2005. 9,177 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17108
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for dia. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for tcpdump
Vendor Patch. Secunia Advisory 74 of 181 in 2005. 9,105 views.
Release Date:
2005-10-10
Secunia Advisory ID:
SA17101
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for tcpdump. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mason
Vendor Patch. Secunia Advisory 75 of 181 in 2005. 8,677 views.
Release Date:
2005-10-06
Secunia Advisory ID:
SA17084
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for mason. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for mailutils
Vendor Patch. Secunia Advisory 76 of 181 in 2005. 8,293 views.
Release Date:
2005-10-05
Secunia Advisory ID:
SA17020
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for mailutils. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for mod-auth-shadow
Vendor Patch. Secunia Advisory 77 of 181 in 2005. 9,258 views.
Release Date:
2005-10-05
Secunia Advisory ID:
SA17067
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for mod-auth-shadow. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for arc
Vendor Patch. Secunia Advisory 78 of 181 in 2005. 9,075 views.
Release Date:
2005-10-05
Secunia Advisory ID:
SA17068
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for arc. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to gain access to sensitive information and perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for egroupware
Vendor Patch. Secunia Advisory 79 of 181 in 2005. 10,275 views.
Release Date:
2005-10-05
Secunia Advisory ID:
SA17066
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for egroupware. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for drupal
Vendor Patch. Secunia Advisory 80 of 181 in 2005. 10,616 views.
Release Date:
2005-10-04
Secunia Advisory ID:
SA17053
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for drupal. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for cfengine2
Vendor Patch. Secunia Advisory 81 of 181 in 2005. 9,903 views.
Release Date:
2005-10-03
Secunia Advisory ID:
SA17040
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for cfengine2. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for cfengine
Vendor Patch. Secunia Advisory 82 of 181 in 2005. 10,053 views.
Release Date:
2005-10-03
Secunia Advisory ID:
SA17038
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for cfengine. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 83 of 181 in 2005. 11,489 views.
Release Date:
2005-10-03
Secunia Advisory ID:
SA17026
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, manipulate certain data, bypass certain security restrictions, and compromise a user's system. [Read More]


Debian update for squid
Vendor Patch. Secunia Advisory 84 of 181 in 2005. 9,092 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA17015
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for loop-aes-utils
Vendor Patch. Secunia Advisory 85 of 181 in 2005. 9,631 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA16988
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for loop-aes-utils. This fixes a security issue, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for backupninja
Vendor Patch. Secunia Advisory 86 of 181 in 2005. 9,077 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA17018
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for backupninja. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for helix-player
Vendor Patch. Secunia Advisory 87 of 181 in 2005. 8,695 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA16981
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for helix-player. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for gopher
Vendor Patch. Secunia Advisory 88 of 181 in 2005. 8,974 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA17016
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gopher. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for ntlmaps
Vendor Patch. Secunia Advisory 89 of 181 in 2005. 9,434 views.
Release Date:
2005-09-30
Secunia Advisory ID:
SA17017
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for ntlmaps. This fixes a security issue, which can be exploited by malicious, local users to disclose certain sensitive information. [Read More]


Debian update for util-linux
Vendor Patch. Secunia Advisory 90 of 181 in 2005. 9,005 views.
Release Date:
2005-09-29
Secunia Advisory ID:
SA17004
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for util-linux. This fixes a security issue, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 91 of 181 in 2005. 7,900 views.
Release Date:
2005-09-29
Secunia Advisory ID:
SA16989
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), or potentially to compromise a vulnerable system. [Read More]


Debian update for gtkdiskfree
Vendor Patch. Secunia Advisory 92 of 181 in 2005. 8,701 views.
Release Date:
2005-09-29
Secunia Advisory ID:
SA17005
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for gtkdiskfree. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for python2.3
Vendor Patch. Secunia Advisory 93 of 181 in 2005. 7,509 views.
Release Date:
2005-09-28
Secunia Advisory ID:
SA16972
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for python2.3. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for courier
Vendor Patch. Secunia Advisory 94 of 181 in 2005. 6,461 views.
Release Date:
2005-09-26
Secunia Advisory ID:
SA16939
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for courier. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for python2.1
Vendor Patch. Secunia Advisory 95 of 181 in 2005. 8,923 views.
Release Date:
2005-09-23
Secunia Advisory ID:
SA16914
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for python2.1. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for kdeedu
Vendor Patch. Secunia Advisory 96 of 181 in 2005. 6,867 views.
Release Date:
2005-09-23
Secunia Advisory ID:
SA16916
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for kdeedu. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges on a vulnerable system. [Read More]


Debian update for xfree86
Vendor Patch. Secunia Advisory 97 of 181 in 2005. 5,946 views.
Release Date:
2005-09-22
Secunia Advisory ID:
SA16905
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for xfree86. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for python2.2
Vendor Patch. Secunia Advisory 98 of 181 in 2005. 7,419 views.
Release Date:
2005-09-22
Secunia Advisory ID:
SA16890
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for python2.2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for kdebase
Vendor Patch. Secunia Advisory 99 of 181 in 2005. 7,021 views.
Release Date:
2005-09-19
Secunia Advisory ID:
SA16850
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for kdebase. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for lm-sensors
Vendor Patch. Secunia Advisory 100 of 181 in 2005. 7,734 views.
Release Date:
2005-09-16
Secunia Advisory ID:
SA16842
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for lm-sensors. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for turqstat
Vendor Patch. Secunia Advisory 101 of 181 in 2005. 7,679 views.
Release Date:
2005-09-15
Secunia Advisory ID:
SA16811
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for turqstat. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for centericq
Vendor Patch. Secunia Advisory 102 of 181 in 2005. 7,838 views.
Release Date:
2005-09-15
Secunia Advisory ID:
SA16815
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for centericq. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for common-lisp-controller
Vendor Patch. Secunia Advisory 103 of 181 in 2005. 7,745 views.
Release Date:
2005-09-14
Secunia Advisory ID:
SA16823
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for common-lisp-controller. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 104 of 181 in 2005. 7,139 views.
Release Date:
2005-09-13
Secunia Advisory ID:
SA16797
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, and compromise a user's system. [Read More]


Debian update for tdiary
Vendor Patch. Secunia Advisory 105 of 181 in 2005. 8,460 views.
Release Date:
2005-09-13
Secunia Advisory ID:
SA16787
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for tdiary. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for libapache-mod-ssl
Vendor Patch. Secunia Advisory 106 of 181 in 2005. 9,672 views.
Release Date:
2005-09-13
Secunia Advisory ID:
SA16771
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for libapache-mod-ssl. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for squid
Vendor Patch. Secunia Advisory 107 of 181 in 2005. 6,691 views.
Release Date:
2005-09-13
Secunia Advisory ID:
SA16768
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for squid. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gcvs
Vendor Patch. Secunia Advisory 108 of 181 in 2005. 9,470 views.
Release Date:
2005-09-09
Secunia Advisory ID:
SA16765
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for gcvs. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 109 of 181 in 2005. 9,348 views.
Release Date:
2005-09-09
Secunia Advisory ID:
SA16754
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
DoS
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes three vulnerabilities and a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service), conduct HTTP request smuggling attacks, and potentially bypass certain security restrictions. [Read More]


Debian update for kdelibs
Vendor Patch. Secunia Advisory 110 of 181 in 2005. 7,382 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16745
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for kdelibs. This fixes a security issue, which can be exploited by malicious, local users to gain knowledge of certain information. [Read More]


Debian update for apache
Vendor Patch. Secunia Advisory 111 of 181 in 2005. 6,205 views.
Release Date:
2005-09-08
Secunia Advisory ID:
SA16741
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for apache. This fixes a vulnerability, which can be exploited by malicious people to conduct HTTP request smuggling attacks. [Read More]


Debian update for ntp
Vendor Patch. Secunia Advisory 112 of 181 in 2005. 8,384 views.
Release Date:
2005-09-05
Secunia Advisory ID:
SA16687
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for ntp. This fixes a security issue, which can cause ntpd to run with incorrect group permissions. [Read More]


Debian update for affix
Vendor Patch. Secunia Advisory 113 of 181 in 2005. 8,046 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16689
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for affix. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for pcre3
Vendor Patch. Secunia Advisory 114 of 181 in 2005. 10,783 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16679
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pcre3. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for polygen
Vendor Patch. Secunia Advisory 115 of 181 in 2005. 7,891 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16673
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Debian has issued an update for polygen. This fixes a weakness, which can be exploited by malicious, local users to manipulate the contents of certain files. [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 116 of 181 in 2005. 8,839 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16675
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 117 of 181 in 2005. 7,137 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16670
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes some vulnerabilities, which can be exploited by malicious administrative users to conduct script insertion attacks, or by malicious people to bypass certain security restrictions or compromise a vulnerable system. [Read More]


Debian update for zsync
Vendor Patch. Secunia Advisory 118 of 181 in 2005. 8,386 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16690
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for zsync. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system. [Read More]


Debian update for proftpd
Vendor Patch. Secunia Advisory 119 of 181 in 2005. 7,968 views.
Release Date:
2005-09-02
Secunia Advisory ID:
SA16681
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for proftpd. This fixes two vulnerabilities, which can be exploited by malicious users to disclose certain sensitive information, cause a DoS (Denial of Service), or potentially compromise a vulnerable system. [Read More]


Debian update for courier
Vendor Patch. Secunia Advisory 120 of 181 in 2005. 6,179 views.
Release Date:
2005-09-01
Secunia Advisory ID:
SA16652
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for courier. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for pstotext
Vendor Patch. Secunia Advisory 121 of 181 in 2005. 8,624 views.
Release Date:
2005-09-01
Secunia Advisory ID:
SA16624
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for pstotext. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for maildrop
Vendor Patch. Secunia Advisory 122 of 181 in 2005. 7,846 views.
Release Date:
2005-08-30
Secunia Advisory ID:
SA16610
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for maildrop. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for php4
Vendor Patch. Secunia Advisory 123 of 181 in 2005. 8,046 views.
Release Date:
2005-08-30
Secunia Advisory ID:
SA16631
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for php4. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, or by malicious people to compromise a vulnerable system. [Read More]


Debian update for phpldapadmin
Vendor Patch. Secunia Advisory 124 of 181 in 2005. 8,266 views.
Release Date:
2005-08-30
Secunia Advisory ID:
SA16636
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for phpldapadmin. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for kismet
Vendor Patch. Secunia Advisory 125 of 181 in 2005. 9,434 views.
Release Date:
2005-08-30
Secunia Advisory ID:
SA16634
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
System access
Where:
From remote
Short Description:
Debian has issued an update for Kismet. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for backup-manager
Vendor Patch. Secunia Advisory 126 of 181 in 2005. 7,915 views.
Release Date:
2005-08-29
Secunia Advisory ID:
SA16591
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for backup-manager. This fixes two vulnerabilities, which potentially can be exploited by malicious, local users to disclose potentially sensitive information or perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for libpam-ldap
Vendor Patch. Secunia Advisory 127 of 181 in 2005. 8,008 views.
Release Date:
2005-08-26
Secunia Advisory ID:
SA16588
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for libpam-ldap. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for simpleproxy
Vendor Patch. Secunia Advisory 128 of 181 in 2005. 7,724 views.
Release Date:
2005-08-26
Secunia Advisory ID:
SA16576
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for simpleproxy. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for courier
Vendor Patch. Secunia Advisory 129 of 181 in 2005. 6,675 views.
Release Date:
2005-08-25
Secunia Advisory ID:
SA16561
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for courier. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 130 of 181 in 2005. 7,723 views.
Release Date:
2005-08-23
Secunia Advisory ID:
SA16527
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, gain knowledge of potentially sensitive information, conduct cross-site scripting attacks and compromise a user's system. [Read More]


Debian update for bluez-utils
Vendor Patch. Secunia Advisory 131 of 181 in 2005. 7,527 views.
Release Date:
2005-08-23
Secunia Advisory ID:
SA16532
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for bluez-utils. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 132 of 181 in 2005. 6,225 views.
Release Date:
2005-08-22
Secunia Advisory ID:
SA16537
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a user's system. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 133 of 181 in 2005. 8,599 views.
Release Date:
2005-08-22
Secunia Advisory ID:
SA16507
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, and compromise a user's system. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 134 of 181 in 2005. 7,809 views.
Release Date:
2005-08-22
Secunia Advisory ID:
SA16536
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 135 of 181 in 2005. 7,451 views.
Release Date:
2005-08-17
Secunia Advisory ID:
SA16473
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes a vulnerability, which can be exploited by malicious people to spoof the contents of web sites. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 136 of 181 in 2005. 9,256 views.
Release Date:
2005-08-16
Secunia Advisory ID:
SA16458
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 137 of 181 in 2005. 7,913 views.
Release Date:
2005-08-15
Secunia Advisory ID:
SA16446
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes a vulnerability, which can be exploited by malicious people to spoof the contents of web sites. [Read More]


Debian update for fetchmail
Vendor Patch. Secunia Advisory 138 of 181 in 2005. 8,335 views.
Release Date:
2005-08-12
Secunia Advisory ID:
SA16421
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian amd64 Update for Multiple Packages
Vendor Patch. Secunia Advisory 139 of 181 in 2005. 9,038 views.
Release Date:
2005-08-12
Secunia Advisory ID:
SA16413
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued updates for multiple packages. These fix several vulnerabilities and covers all security updates since the release of sarge for the stable amd64 distribution. [Read More]


Debian apt-cacher Unspecified Arbitrary Command Execution
Vendor Patch. Secunia Advisory 140 of 181 in 2005. 12,833 views.
Release Date:
2005-08-03
Secunia Advisory ID:
SA16327
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Eduard Bloch has reported a vulnerability in apt-cacher, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for pdns
Vendor Patch. Secunia Advisory 141 of 181 in 2005. 7,326 views.
Release Date:
2005-08-01
Secunia Advisory ID:
SA16303
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for pdns. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gopher
Vendor Patch. Secunia Advisory 142 of 181 in 2005. 8,002 views.
Release Date:
2005-08-01
Secunia Advisory ID:
SA16277
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for gopher. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for gaim
Vendor Patch. Secunia Advisory 143 of 181 in 2005. 8,273 views.
Release Date:
2005-07-29
Secunia Advisory ID:
SA16269
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gaim. This fixes a weakness, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for phpbb2
Vendor Patch. Secunia Advisory 144 of 181 in 2005. 8,178 views.
Release Date:
2005-07-28
Secunia Advisory ID:
SA16232
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for phpbb2. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for ekg
Vendor Patch. Secunia Advisory 145 of 181 in 2005. 8,072 views.
Release Date:
2005-07-28
Secunia Advisory ID:
SA16248
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ekg. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 146 of 181 in 2005. 7,393 views.
Release Date:
2005-07-27
Secunia Advisory ID:
SA16234
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for heimdal
Vendor Patch. Secunia Advisory 147 of 181 in 2005. 8,099 views.
Release Date:
2005-07-22
Secunia Advisory ID:
SA16171
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for heimdal. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for zlib
Vendor Patch. Secunia Advisory 148 of 181 in 2005. 6,861 views.
Release Date:
2005-07-21
Secunia Advisory ID:
SA16153
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for zlib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) against a vulnerable application. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 149 of 181 in 2005. 9,403 views.
Release Date:
2005-07-21
Secunia Advisory ID:
SA16136
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks, bypass certain security restrictions and compromise a vulnerable system. [Read More]


Debian update for heartbeat
Vendor Patch. Secunia Advisory 150 of 181 in 2005. 7,132 views.
Release Date:
2005-07-19
Secunia Advisory ID:
SA16118
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for heartbeat. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for ekg
Vendor Patch. Secunia Advisory 151 of 181 in 2005. 7,504 views.
Release Date:
2005-07-19
Secunia Advisory ID:
SA16120
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for ekg. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for affix
Vendor Patch. Secunia Advisory 152 of 181 in 2005. 8,016 views.
Release Date:
2005-07-19
Secunia Advisory ID:
SA16122
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for affix. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for phppgadmin
Vendor Patch. Secunia Advisory 153 of 181 in 2005. 9,940 views.
Release Date:
2005-07-18
Secunia Advisory ID:
SA16116
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for phppgadmin. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information. [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 154 of 181 in 2005. 7,663 views.
Release Date:
2005-07-18
Secunia Advisory ID:
SA16114
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for heimdal
Vendor Patch. Secunia Advisory 155 of 181 in 2005. 6,253 views.
Release Date:
2005-07-18
Secunia Advisory ID:
SA16112
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for heimdal. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 156 of 181 in 2005. 7,843 views.
Release Date:
2005-07-14
Secunia Advisory ID:
SA16067
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose and manipulate sensitive information. [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 157 of 181 in 2005. 7,907 views.
Release Date:
2005-07-14
Secunia Advisory ID:
SA16029
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 158 of 181 in 2005. 7,940 views.
Release Date:
2005-07-13
Secunia Advisory ID:
SA16063
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for centericq
Vendor Patch. Secunia Advisory 159 of 181 in 2005. 6,389 views.
Release Date:
2005-07-13
Secunia Advisory ID:
SA16053
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for centericq. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for gedit
Vendor Patch. Secunia Advisory 160 of 181 in 2005. 6,643 views.
Release Date:
2005-07-12
Secunia Advisory ID:
SA15996
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gedit. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for squid
Vendor Patch. Secunia Advisory 161 of 181 in 2005. 7,511 views.
Release Date:
2005-07-12
Secunia Advisory ID:
SA16032
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From local network
Short Description:
Debian has issued an update for squid. This fixes a vulnerability, which can be exploited by malicious people to spoof DNS lookups. [Read More]


Debian update for gzip
Vendor Patch. Secunia Advisory 162 of 181 in 2005. 8,024 views.
Release Date:
2005-07-12
Secunia Advisory ID:
SA16030
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gzip. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for hteditor
Vendor Patch. Secunia Advisory 163 of 181 in 2005. 7,851 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA16026
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for hteditor. This fixes two vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for drupal
Vendor Patch. Secunia Advisory 164 of 181 in 2005. 7,504 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA16002
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for drupal. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for dhcpcd
Vendor Patch. Secunia Advisory 165 of 181 in 2005. 6,368 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA15984
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for dhcpcd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ruby1.8
Vendor Patch. Secunia Advisory 166 of 181 in 2005. 6,923 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA15997
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for ruby1.8. This fixes a vulnerability, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for egroupware
Vendor Patch. Secunia Advisory 167 of 181 in 2005. 8,320 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA15999
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for egroupware. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for ettercap
Vendor Patch. Secunia Advisory 168 of 181 in 2005. 9,223 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA16000
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ettercap. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for fuse
Vendor Patch. Secunia Advisory 169 of 181 in 2005. 9,345 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA16024
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for fuse. This fixes a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Debian update for cvs
Vendor Patch. Secunia Advisory 170 of 181 in 2005. 7,681 views.
Release Date:
2005-07-08
Secunia Advisory ID:
SA15992
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for cvs. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for bzip2
Vendor Patch. Secunia Advisory 171 of 181 in 2005. 7,962 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15948
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bzip2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian "apt-setup" Insecure File Permission Security Issue
Unpatched. Secunia Advisory 172 of 181 in 2005. 10,920 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15955
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Alexander Mader has reported a security issue in Debian apt-setup, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Debian update for trac
Vendor Patch. Secunia Advisory 173 of 181 in 2005. 8,032 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15973
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for trac. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information and potentially compromise a vulnerable system. [Read More]


Debian update for zlib
Vendor Patch. Secunia Advisory 174 of 181 in 2005. 9,065 views.
Release Date:
2005-07-07
Secunia Advisory ID:
SA15964
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for zlib. This fixes a vulnerability, which can be exploited by malicious people to conduct a DoS (Denial of Service) against a vulnerable application, or potentially to execute arbitrary code. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 175 of 181 in 2005. 6,815 views.
Release Date:
2005-07-06
Secunia Advisory ID:
SA15919
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gaim
Vendor Patch. Secunia Advisory 176 of 181 in 2005. 8,153 views.
Release Date:
2005-07-06
Secunia Advisory ID:
SA15943
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gaim. This fixes two weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for razor
Vendor Patch. Secunia Advisory 177 of 181 in 2005. 6,825 views.
Release Date:
2005-07-06
Secunia Advisory ID:
SA15921
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for razor. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for spamassassin
Vendor Patch. Secunia Advisory 178 of 181 in 2005. 10,001 views.
Release Date:
2005-07-01
Secunia Advisory ID:
SA15896
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for spamassassin. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 179 of 181 in 2005. 7,188 views.
Release Date:
2005-07-01
Secunia Advisory ID:
SA15890
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes a vulnerability, which can be exploited by malicious, local users to execute arbitrary commands with escalated privileges. [Read More]


Debian update for crip
Vendor Patch. Secunia Advisory 180 of 181 in 2005. 8,505 views.
Release Date:
2005-06-30
Secunia Advisory ID:
SA15882
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for crip. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for ppxp
Vendor Patch. Secunia Advisory 181 of 181 in 2005. 7,100 views.
Release Date:
2005-05-20
Secunia Advisory ID:
SA15444
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for ppxp. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 3.1 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability