Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 3.1

This vulnerability report for Debian GNU/Linux 3.1 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 3.1 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 639 Secunia advisories
1712 Vulnerabilities

Monitor Product Receive alerts for this product





301 Secunia Advisories in 2006

Secunia has issued a total of 301 Secunia advisories in 2006 for Debian GNU/Linux 3.1. Currently, 0% (1 out of 301) are marked as unpatched with the most severe being rated Not critical

More information about the specific Secunia advisories affecting Debian GNU/Linux 3.1 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for evince
Vendor Patch. Secunia Advisory 1 of 301 in 2006. 9,708 views.
Release Date:
2006-12-29
Secunia Advisory ID:
SA23579
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for evince. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 2 of 301 in 2006. 9,319 views.
Release Date:
2006-12-29
Secunia Advisory ID:
SA23504
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks. [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 3 of 301 in 2006. 9,497 views.
Release Date:
2006-12-29
Secunia Advisory ID:
SA23567
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for elog
Vendor Patch. Secunia Advisory 4 of 301 in 2006. 9,066 views.
Release Date:
2006-12-29
Secunia Advisory ID:
SA23580
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for elog. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service), and malicious users to conduct script insertion attacks, cause a DoS, and potentially compromise a vulnerable system. [Read More]


Debian update for links2
Vendor Patch. Secunia Advisory 5 of 301 in 2006. 9,459 views.
Release Date:
2006-12-22
Secunia Advisory ID:
SA23467
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Debian has issued an update for links2. This fixes some vulnerabilities, which can be exploited by malicious people to expose sensitive information and manipulate data. [Read More]


Debian update for kernel-source-2.4.27
Vendor Patch. Secunia Advisory 6 of 301 in 2006. 7,155 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23395
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.4.27. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information or cause a DoS (Denial of Service), and by malicious people to cause a DoS. [Read More]


Debian update for sql-ledger
Vendor Patch. Secunia Advisory 7 of 301 in 2006. 10,055 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23419
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
System access
Where:
From remote
Short Description:
Debian has issued an update for sql-ledger. This fixes some vulnerabilities, which can be exploited by malicious people to hijack user sessions and compromise a vulnerable system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 8 of 301 in 2006. 7,327 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23379
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kernel
Vendor Patch. Secunia Advisory 9 of 301 in 2006. 14,465 views.
Release Date:
2006-12-14
Secunia Advisory ID:
SA23370
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to expose potentially sensitive information and cause a DoS (Denial of Service), and malicious people to cause a DoS. [Read More]


Debian update for enemies-of-carlotta
Vendor Patch. Secunia Advisory 10 of 301 in 2006. 7,997 views.
Release Date:
2006-12-14
Secunia Advisory ID:
SA23382
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for enemies-of-carlotta. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for ruby-1.6 and ruby-1.8
Vendor Patch. Secunia Advisory 11 of 301 in 2006. 6,880 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23344
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ruby-1.6 and ruby-1.8. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 12 of 301 in 2006. 8,107 views.
Release Date:
2006-12-13
Secunia Advisory ID:
SA23327
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for l2tpns
Vendor Patch. Secunia Advisory 13 of 301 in 2006. 8,599 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23333
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for l2tpns. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for gnupg
Vendor Patch. Secunia Advisory 14 of 301 in 2006. 9,465 views.
Release Date:
2006-12-11
Secunia Advisory ID:
SA23299
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gnupg. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 15 of 301 in 2006. 8,362 views.
Release Date:
2006-12-06
Secunia Advisory ID:
SA23212
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for elinks
Vendor Patch. Secunia Advisory 16 of 301 in 2006. 7,449 views.
Release Date:
2006-12-06
Secunia Advisory ID:
SA23234
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Debian has issued an update for elinks. This fixes a vulnerability, which can be exploited by malicious people to expose sensitive information and manipulate data. [Read More]


Debian update for links
Vendor Patch. Secunia Advisory 17 of 301 in 2006. 7,722 views.
Release Date:
2006-12-05
Secunia Advisory ID:
SA23188
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Debian has issued an update for links. This fixes a vulnerability, which can be exploited by malicious people to expose sensitive information and manipulate data. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 18 of 301 in 2006. 8,098 views.
Release Date:
2006-12-04
Secunia Advisory ID:
SA23197
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Debian update for tar
Vendor Patch. Secunia Advisory 19 of 301 in 2006. 8,082 views.
Release Date:
2006-12-04
Secunia Advisory ID:
SA23163
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for tar. This fixes a security issue, which can be exploited by malicious people to overwrite arbitrary files. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 20 of 301 in 2006. 9,276 views.
Release Date:
2006-12-04
Secunia Advisory ID:
SA23235
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 21 of 301 in 2006. 9,202 views.
Release Date:
2006-12-04
Secunia Advisory ID:
SA23202
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, and potentially compromise a vulnerable system. [Read More]


Debian update for proftpd
Vendor Patch. Secunia Advisory 22 of 301 in 2006. 9,519 views.
Release Date:
2006-12-01
Secunia Advisory ID:
SA23174
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for proftpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users and malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for libgsf
Vendor Patch. Secunia Advisory 23 of 301 in 2006. 7,891 views.
Release Date:
2006-11-30
Secunia Advisory ID:
SA23167
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libgsf. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for texinfo
Vendor Patch. Secunia Advisory 24 of 301 in 2006. 8,711 views.
Release Date:
2006-11-30
Secunia Advisory ID:
SA23112
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
System access
Where:
From remote
Short Description:
Debian has issued an update for texinfo. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to potentially compromise a vulnerable system. [Read More]


Debian update for pstotext
Vendor Patch. Secunia Advisory 25 of 301 in 2006. 6,891 views.
Release Date:
2006-11-28
Secunia Advisory ID:
SA23135
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for pstotext. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for linux-ftpd
Vendor Patch. Secunia Advisory 26 of 301 in 2006. 8,517 views.
Release Date:
2006-11-23
Secunia Advisory ID:
SA22997
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for linux-ftpd. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, or perform certain actions with escalated privileges. [Read More]


Debian update for proftpd
Vendor Patch. Secunia Advisory 27 of 301 in 2006. 10,635 views.
Release Date:
2006-11-22
Secunia Advisory ID:
SA23069
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for proftpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gv
Vendor Patch. Secunia Advisory 28 of 301 in 2006. 8,858 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23006
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gv. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for flexbackup
Vendor Patch. Secunia Advisory 29 of 301 in 2006. 7,619 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23008
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for flexbackup. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 30 of 301 in 2006. 7,564 views.
Release Date:
2006-11-21
Secunia Advisory ID:
SA23010
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a user's system. [Read More]


Debian update for imagemagick
Vendor Patch. Secunia Advisory 31 of 301 in 2006. 10,584 views.
Release Date:
2006-11-20
Secunia Advisory ID:
SA22998
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for openssh
Vendor Patch. Secunia Advisory 32 of 301 in 2006. 9,385 views.
Release Date:
2006-11-16
Secunia Advisory ID:
SA22926
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssh. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for pdns
Vendor Patch. Secunia Advisory 33 of 301 in 2006. 7,964 views.
Release Date:
2006-11-15
Secunia Advisory ID:
SA22903
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for pdns. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for trac
Vendor Patch. Secunia Advisory 34 of 301 in 2006. 9,290 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22868
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Where:
From remote
Short Description:
Debian has issued an update for trac. This fixes a vulnerability which can be exploited by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 35 of 301 in 2006. 10,202 views.
Release Date:
2006-11-14
Secunia Advisory ID:
SA22849
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing and DoS (Denial of Service) attacks, bypass certain security restrictions and potentially compromise a user's system. [Read More]


Debian update for bugzilla
Vendor Patch. Secunia Advisory 36 of 301 in 2006. 8,601 views.
Release Date:
2006-11-13
Secunia Advisory ID:
SA22826
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for bugzilla. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges, and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 37 of 301 in 2006. 9,337 views.
Release Date:
2006-11-10
Secunia Advisory ID:
SA22781
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Cross Site Scripting
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, HTTP response splitting attacks, and cross-site forgery request attacks. [Read More]


Debian update for php4
Vendor Patch. Secunia Advisory 38 of 301 in 2006. 8,691 views.
Release Date:
2006-11-08
Secunia Advisory ID:
SA22713
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for php4. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. [Read More]


Debian update for thttpd
Vendor Patch. Secunia Advisory 39 of 301 in 2006. 8,768 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22712
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for thttpd. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for ingo1
Vendor Patch. Secunia Advisory 40 of 301 in 2006. 7,877 views.
Release Date:
2006-11-03
Secunia Advisory ID:
SA22656
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for ingo1. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for pam_ldap
Vendor Patch. Secunia Advisory 41 of 301 in 2006. 9,112 views.
Release Date:
2006-11-03
Secunia Advisory ID:
SA22694
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for pam_ldap. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for screen
Vendor Patch. Secunia Advisory 42 of 301 in 2006. 8,079 views.
Release Date:
2006-11-02
Secunia Advisory ID:
SA22647
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for screen. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for ethereal
Vendor Patch. Secunia Advisory 43 of 301 in 2006. 10,208 views.
Release Date:
2006-11-01
Secunia Advisory ID:
SA22659
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for qt-x11-free
Vendor Patch. Secunia Advisory 44 of 301 in 2006. 7,650 views.
Release Date:
2006-10-31
Secunia Advisory ID:
SA22645
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issue an update for qt-x11-free. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for webmin
Vendor Patch. Secunia Advisory 45 of 301 in 2006. 10,608 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22556
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for webmin. This fixes some vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. [Read More]


Debian update for python2.3
Vendor Patch. Secunia Advisory 46 of 301 in 2006. 8,399 views.
Release Date:
2006-10-24
Secunia Advisory ID:
SA22531
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for python 2.3. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for maxdb-7.5.00
Vendor Patch. Secunia Advisory 47 of 301 in 2006. 6,653 views.
Release Date:
2006-10-23
Secunia Advisory ID:
SA22518
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for maxdb-7.5.00. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for python2.4
Vendor Patch. Secunia Advisory 48 of 301 in 2006. 7,519 views.
Release Date:
2006-10-23
Secunia Advisory ID:
SA22512
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for python2.4. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 49 of 301 in 2006. 8,315 views.
Release Date:
2006-10-23
Secunia Advisory ID:
SA22537
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for openssl096
Vendor Patch. Secunia Advisory 50 of 301 in 2006. 9,171 views.
Release Date:
2006-10-19
Secunia Advisory ID:
SA22500
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl096. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for libwmf
Vendor Patch. Secunia Advisory 51 of 301 in 2006. 8,241 views.
Release Date:
2006-10-10
Secunia Advisory ID:
SA22311
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libwmf. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for xfree86
Vendor Patch. Secunia Advisory 52 of 301 in 2006. 7,580 views.
Release Date:
2006-10-10
Secunia Advisory ID:
SA22332
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xfree86. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges, and by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 53 of 301 in 2006. 8,255 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22299
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 54 of 301 in 2006. 8,849 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22247
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct man-in-the-middle attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


Debian update for openssh-krb5
Vendor Patch. Secunia Advisory 55 of 301 in 2006. 8,966 views.
Release Date:
2006-10-05
Secunia Advisory ID:
SA22270
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssh-krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mailman
Vendor Patch. Secunia Advisory 56 of 301 in 2006. 8,125 views.
Release Date:
2006-10-04
Secunia Advisory ID:
SA22227
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for mailman. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks. [Read More]


Debian update for cscope
Vendor Patch. Secunia Advisory 57 of 301 in 2006. 7,946 views.
Release Date:
2006-10-02
Secunia Advisory ID:
SA22239
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cscope. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for migrationtools
Vendor Patch. Secunia Advisory 58 of 301 in 2006. 8,492 views.
Release Date:
2006-10-02
Secunia Advisory ID:
SA22243
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for migrationtools. This fixes a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges on a vulnerable system. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 59 of 301 in 2006. 10,970 views.
Release Date:
2006-10-02
Secunia Advisory ID:
SA22240
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for kernel-source-2.6.8
Vendor Patch. Secunia Advisory 60 of 301 in 2006. 9,233 views.
Release Date:
2006-09-26
Secunia Advisory ID:
SA22093
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.6.8. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, bypass certain security restriction, and cause a DoS (Denial of Service), and malicious people to cause a DoS. [Read More]


Debian update for kernel-source-2.4.27
Vendor Patch. Secunia Advisory 61 of 301 in 2006. 7,662 views.
Release Date:
2006-09-25
Secunia Advisory ID:
SA22082
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and cause a DoS (Denial of Service), and by malicious people to cause a DoS. [Read More]


Debian update for gnutls11 / gnutls13
Vendor Patch. Secunia Advisory 62 of 301 in 2006. 8,311 views.
Release Date:
2006-09-25
Secunia Advisory ID:
SA22084
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued updates for gnutls11 and gnutls13. These fix a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for bomberclone
Vendor Patch. Secunia Advisory 63 of 301 in 2006. 7,896 views.
Release Date:
2006-09-20
Secunia Advisory ID:
SA21985
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
DoS
Where:
From remote
Short Description:
Debian has issued an update for bomberclone. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of system information or cause a DoS (Denial of Service). [Read More]


Debian update for gzip
Vendor Patch. Secunia Advisory 64 of 301 in 2006. 10,289 views.
Release Date:
2006-09-20
Secunia Advisory ID:
SA22034
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an updated for gzip. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for alsaplayer
Vendor Patch. Secunia Advisory 65 of 301 in 2006. 7,210 views.
Release Date:
2006-09-19
Secunia Advisory ID:
SA22018
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for alsaplayer. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for zope2.7
Vendor Patch. Secunia Advisory 66 of 301 in 2006. 8,957 views.
Release Date:
2006-09-18
Secunia Advisory ID:
SA21953
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for zope2.7. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for usermin
Vendor Patch. Secunia Advisory 67 of 301 in 2006. 8,761 views.
Release Date:
2006-09-18
Secunia Advisory ID:
SA21981
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for usermin. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for isakmpd
Vendor Patch. Secunia Advisory 68 of 301 in 2006. 8,685 views.
Release Date:
2006-09-14
Secunia Advisory ID:
SA21905
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for isakmpd. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for openssl096
Vendor Patch. Secunia Advisory 69 of 301 in 2006. 9,654 views.
Release Date:
2006-09-12
Secunia Advisory ID:
SA21873
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for openssl096. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 70 of 301 in 2006. 9,811 views.
Release Date:
2006-09-11
Secunia Advisory ID:
SA21852
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 71 of 301 in 2006. 8,788 views.
Release Date:
2006-09-11
Secunia Advisory ID:
SA21828
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ethereal
Vendor Patch. Secunia Advisory 72 of 301 in 2006. 10,155 views.
Release Date:
2006-09-08
Secunia Advisory ID:
SA21813
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system. [Read More]


Debian update for gcc-3.4
Vendor Patch. Secunia Advisory 73 of 301 in 2006. 7,960 views.
Release Date:
2006-09-07
Secunia Advisory ID:
SA21797
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gcc-3.4. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for apache
Vendor Patch. Secunia Advisory 74 of 301 in 2006. 10,800 views.
Release Date:
2006-09-05
Secunia Advisory ID:
SA21744
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for apache. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for imagemagick
Vendor Patch. Secunia Advisory 75 of 301 in 2006. 9,700 views.
Release Date:
2006-09-05
Secunia Advisory ID:
SA21719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mysql-dfsg-4.1
Vendor Patch. Secunia Advisory 76 of 301 in 2006. 10,211 views.
Release Date:
2006-09-05
Secunia Advisory ID:
SA21762
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg-4.1. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions or to cause a DoS (Denial of Service). [Read More]


Debian update for cheesetracker
Vendor Patch. Secunia Advisory 77 of 301 in 2006. 10,217 views.
Release Date:
2006-09-04
Secunia Advisory ID:
SA21759
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cheesetracker. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for capi4hylafax
Vendor Patch. Secunia Advisory 78 of 301 in 2006. 11,548 views.
Release Date:
2006-09-01
Secunia Advisory ID:
SA21722
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an advisory for capi4hylafax. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for gtetrinet
Vendor Patch. Secunia Advisory 79 of 301 in 2006. 9,350 views.
Release Date:
2006-08-31
Secunia Advisory ID:
SA21704
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gtetrinet. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 80 of 301 in 2006. 10,458 views.
Release Date:
2006-08-31
Secunia Advisory ID:
SA21696
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libmusicbrainz-2.0
Vendor Patch. Secunia Advisory 81 of 301 in 2006. 9,833 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21668
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libmusicbrainz-2.0. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 82 of 301 in 2006. 10,764 views.
Release Date:
2006-08-30
Secunia Advisory ID:
SA21675
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 83 of 301 in 2006. 10,449 views.
Release Date:
2006-08-29
Secunia Advisory ID:
SA21634
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks and potentially compromise a user's system. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 84 of 301 in 2006. 11,999 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21654
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks and potentially compromise a user's system. [Read More]


Debian update for ruby1.8
Vendor Patch. Secunia Advisory 85 of 301 in 2006. 9,314 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21657
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Debian has issued an update for ruby1.8. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Debian update for kdebase
Vendor Patch. Secunia Advisory 86 of 301 in 2006. 9,997 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21662
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Debian has issued an update for kdebase. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Debian update for streamripper
Vendor Patch. Secunia Advisory 87 of 301 in 2006. 8,987 views.
Release Date:
2006-08-28
Secunia Advisory ID:
SA21658
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for streamripper. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 88 of 301 in 2006. 7,133 views.
Release Date:
2006-08-24
Secunia Advisory ID:
SA21612
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 89 of 301 in 2006. 10,402 views.
Release Date:
2006-08-21
Secunia Advisory ID:
SA21562
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for trac
Vendor Patch. Secunia Advisory 90 of 301 in 2006. 7,543 views.
Release Date:
2006-08-18
Secunia Advisory ID:
SA21534
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for trac. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks and disclose sensitive information. [Read More]


Debian update for heartbeat
Vendor Patch. Secunia Advisory 91 of 301 in 2006. 7,139 views.
Release Date:
2006-08-16
Secunia Advisory ID:
SA21518
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for heartbeat. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for shadow
Vendor Patch. Secunia Advisory 92 of 301 in 2006. 7,846 views.
Release Date:
2006-08-14
Secunia Advisory ID:
SA21480
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for shadow. This fixes a security issue, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for drupal
Vendor Patch. Secunia Advisory 93 of 301 in 2006. 7,943 views.
Release Date:
2006-08-14
Secunia Advisory ID:
SA21503
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for gallery
Vendor Patch. Secunia Advisory 94 of 301 in 2006. 9,687 views.
Release Date:
2006-08-14
Secunia Advisory ID:
SA21502
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for gallery. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks or disclose certain sensitive information. [Read More]


Debian update for ncompress
Vendor Patch. Secunia Advisory 95 of 301 in 2006. 8,830 views.
Release Date:
2006-08-10
Secunia Advisory ID:
SA21434
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 96 of 301 in 2006. 7,413 views.
Release Date:
2006-08-09
Secunia Advisory ID:
SA21439
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for krb5. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 97 of 301 in 2006. 8,408 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21400
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for chmlib
Vendor Patch. Secunia Advisory 98 of 301 in 2006. 6,892 views.
Release Date:
2006-08-08
Secunia Advisory ID:
SA21406
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for chmlib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for dhcp
Vendor Patch. Secunia Advisory 99 of 301 in 2006. 8,876 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21363
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for cfs
Vendor Patch. Secunia Advisory 100 of 301 in 2006. 9,044 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21341
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for cfs. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for freeciv
Vendor Patch. Secunia Advisory 101 of 301 in 2006. 8,040 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21352
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for freeciv. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gnupg2
Vendor Patch. Secunia Advisory 102 of 301 in 2006. 7,767 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21351
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gnupg2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gnupg
Vendor Patch. Secunia Advisory 103 of 301 in 2006. 7,709 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21333
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ruby1.6
Vendor Patch. Secunia Advisory 104 of 301 in 2006. 6,604 views.
Release Date:
2006-08-04
Secunia Advisory ID:
SA21337
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for ruby1.6. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for gpdf
Vendor Patch. Secunia Advisory 105 of 301 in 2006. 7,242 views.
Release Date:
2006-08-03
Secunia Advisory ID:
SA21339
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 106 of 301 in 2006. 9,540 views.
Release Date:
2006-08-03
Secunia Advisory ID:
SA21334
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 107 of 301 in 2006. 9,531 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21324
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. [Read More]


Debian update for libtunepimp
Vendor Patch. Secunia Advisory 108 of 301 in 2006. 7,129 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21323
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libtunepimp. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for apache
Vendor Patch. Secunia Advisory 109 of 301 in 2006. 12,003 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21313
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for apache. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for apache2
Vendor Patch. Secunia Advisory 110 of 301 in 2006. 10,754 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21284
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for apache2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for sitebar
Vendor Patch. Secunia Advisory 111 of 301 in 2006. 7,614 views.
Release Date:
2006-08-02
Secunia Advisory ID:
SA21248
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for sitebar. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for osiris
Vendor Patch. Secunia Advisory 112 of 301 in 2006. 7,357 views.
Release Date:
2006-08-01
Secunia Advisory ID:
SA21265
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for osiris. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for drupal
Vendor Patch. Secunia Advisory 113 of 301 in 2006. 9,524 views.
Release Date:
2006-07-28
Secunia Advisory ID:
SA21244
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Manipulation of data
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, and by malicious users to potentially compromise a vulnerable system. [Read More]


Debian update for ethereal
Vendor Patch. Secunia Advisory 114 of 301 in 2006. 9,556 views.
Release Date:
2006-07-28
Secunia Advisory ID:
SA21249
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for heartbeat
Vendor Patch. Secunia Advisory 115 of 301 in 2006. 8,134 views.
Release Date:
2006-07-28
Secunia Advisory ID:
SA21240
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Debian has issued an update for heartbeat. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 116 of 301 in 2006. 7,538 views.
Release Date:
2006-07-27
Secunia Advisory ID:
SA21222
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for fbi
Vendor Patch. Secunia Advisory 117 of 301 in 2006. 7,471 views.
Release Date:
2006-07-26
Secunia Advisory ID:
SA21191
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for fbi. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for libgd2
Vendor Patch. Secunia Advisory 118 of 301 in 2006. 8,883 views.
Release Date:
2006-07-25
Secunia Advisory ID:
SA21186
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libgd2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) against applications and services using libgd2. [Read More]


Debian update for gimp
Vendor Patch. Secunia Advisory 119 of 301 in 2006. 7,034 views.
Release Date:
2006-07-25
Secunia Advisory ID:
SA21182
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gimp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for libdumb
Vendor Patch. Secunia Advisory 120 of 301 in 2006. 6,941 views.
Release Date:
2006-07-25
Secunia Advisory ID:
SA21184
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libdumb. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for libnet-server-perl
Vendor Patch. Secunia Advisory 121 of 301 in 2006. 9,903 views.
Release Date:
2006-07-25
Secunia Advisory ID:
SA21152
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libnet-server-perl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 122 of 301 in 2006. 10,200 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21176
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP response smuggling attacks, and potentially compromise a user's system. [Read More]


Debian update for hiki
Vendor Patch. Secunia Advisory 123 of 301 in 2006. 8,428 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21150
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for hiki. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for postgrey
Vendor Patch. Secunia Advisory 124 of 301 in 2006. 7,718 views.
Release Date:
2006-07-24
Secunia Advisory ID:
SA21164
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for postgrey. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for hashcash
Vendor Patch. Secunia Advisory 125 of 301 in 2006. 9,102 views.
Release Date:
2006-07-21
Secunia Advisory ID:
SA21146
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for hashcash. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for gnupg2
Vendor Patch. Secunia Advisory 126 of 301 in 2006. 9,008 views.
Release Date:
2006-07-21
Secunia Advisory ID:
SA21137
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gnupg2. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for kernel-source
Vendor Patch. Secunia Advisory 127 of 301 in 2006. 8,266 views.
Release Date:
2006-07-20
Secunia Advisory ID:
SA21123
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for kernel-source. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for zope
Vendor Patch. Secunia Advisory 128 of 301 in 2006. 9,015 views.
Release Date:
2006-07-20
Secunia Advisory ID:
SA21130
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for zope. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for mutt
Vendor Patch. Secunia Advisory 129 of 301 in 2006. 7,911 views.
Release Date:
2006-07-20
Secunia Advisory ID:
SA21124
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mutt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 130 of 301 in 2006. 7,165 views.
Release Date:
2006-07-17
Secunia Advisory ID:
SA21086
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for rssh
Vendor Patch. Secunia Advisory 131 of 301 in 2006. 7,379 views.
Release Date:
2006-07-17
Secunia Advisory ID:
SA21087
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for rssh. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for gnupg
Vendor Patch. Secunia Advisory 132 of 301 in 2006. 9,196 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA20968
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gnupg. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ppp
Vendor Patch. Secunia Advisory 133 of 301 in 2006. 8,268 views.
Release Date:
2006-07-10
Secunia Advisory ID:
SA20996
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for ppp. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 134 of 301 in 2006. 9,437 views.
Release Date:
2006-07-07
Secunia Advisory ID:
SA20942
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes a weakness, which can be exploited by malicious people to crash certain applications on a user's system. [Read More]


Debian update for kernel-source-2.6.8
Vendor Patch. Secunia Advisory 135 of 301 in 2006. 9,551 views.
Release Date:
2006-07-04
Secunia Advisory ID:
SA20914
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.6.8. This fixes some vulnerabilities and weaknesses, which can be exploited to bypass certain security restrictions, disclose potentially sensitive information, and cause a DoS (Denial of Service). [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 136 of 301 in 2006. 10,269 views.
Release Date:
2006-06-30
Secunia Advisory ID:
SA20893
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for pinball
Vendor Patch. Secunia Advisory 137 of 301 in 2006. 9,331 views.
Release Date:
2006-06-26
Secunia Advisory ID:
SA20834
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for pinball. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for courier
Vendor Patch. Secunia Advisory 138 of 301 in 2006. 8,408 views.
Release Date:
2006-06-23
Secunia Advisory ID:
SA20792
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for courier. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for horde2
Vendor Patch. Secunia Advisory 139 of 301 in 2006. 9,248 views.
Release Date:
2006-06-19
Secunia Advisory ID:
SA20750
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde2. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 140 of 301 in 2006. 9,404 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20672
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for wv2
Vendor Patch. Secunia Advisory 141 of 301 in 2006. 7,939 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20688
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for wv2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for kernel-source-2.4.27
Vendor Patch. Secunia Advisory 142 of 301 in 2006. 9,700 views.
Release Date:
2006-06-15
Secunia Advisory ID:
SA20671
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.4.27. This fixes some vulnerabilities and weaknesses, which can be exploited by malicious, local users to bypass certain security restrictions, disclose potentially sensitive information and cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions, gain knowledge of certain system information, and cause a DoS. [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 143 of 301 in 2006. 7,410 views.
Release Date:
2006-06-13
Secunia Advisory ID:
SA20542
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 144 of 301 in 2006. 8,231 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20622
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for gforge. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 145 of 301 in 2006. 10,054 views.
Release Date:
2006-06-12
Secunia Advisory ID:
SA20591
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mysql-dfsg-4.1
Vendor Patch. Secunia Advisory 146 of 301 in 2006. 9,765 views.
Release Date:
2006-06-09
Secunia Advisory ID:
SA20541
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for mysql-dfsg-4.1. This fixes a vulnerability, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 147 of 301 in 2006. 9,587 views.
Release Date:
2006-06-08
Secunia Advisory ID:
SA20520
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for spamassassin
Vendor Patch. Secunia Advisory 148 of 301 in 2006. 9,870 views.
Release Date:
2006-06-06
Secunia Advisory ID:
SA20443
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for spamassassin, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for freeradius
Vendor Patch. Secunia Advisory 149 of 301 in 2006. 9,248 views.
Release Date:
2006-06-05
Secunia Advisory ID:
SA20461
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From local network
Short Description:
Debian has issued an update for freeradius. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or bypass certain security restrictions. [Read More]


Debian update for centericq
Vendor Patch. Secunia Advisory 150 of 301 in 2006. 8,214 views.
Release Date:
2006-06-05
Secunia Advisory ID:
SA20446
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for centericq. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 151 of 301 in 2006. 9,140 views.
Release Date:
2006-06-05
Secunia Advisory ID:
SA20451
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for postgresql. This fixes two vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for lynx-cur
Vendor Patch. Secunia Advisory 152 of 301 in 2006. 9,529 views.
Release Date:
2006-06-02
Secunia Advisory ID:
SA20383
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for lynx-cur. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for typespeed
Vendor Patch. Secunia Advisory 153 of 301 in 2006. 9,279 views.
Release Date:
2006-06-01
Secunia Advisory ID:
SA20393
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for typespeed. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for motor
Vendor Patch. Secunia Advisory 154 of 301 in 2006. 8,508 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20368
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for motor. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for dovecot
Vendor Patch. Secunia Advisory 155 of 301 in 2006. 8,254 views.
Release Date:
2006-05-29
Secunia Advisory ID:
SA20315
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for dovecot. This fixes a weakness, which can be exploited by malicious users to gain knowledge of potentially sensitive information. [Read More]


Debian update for mysql-dfsg
Vendor Patch. Secunia Advisory 156 of 301 in 2006. 9,801 views.
Release Date:
2006-05-29
Secunia Advisory ID:
SA20333
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, disclose potentially sensitive information, and compromise a vulnerable system. [Read More]


Debian update for libextractor
Vendor Patch. Secunia Advisory 157 of 301 in 2006. 7,816 views.
Release Date:
2006-05-29
Secunia Advisory ID:
SA20326
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libextractor. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application that uses the library. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 158 of 301 in 2006. 8,120 views.
Release Date:
2006-05-29
Secunia Advisory ID:
SA20330
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for awstats
Vendor Patch. Secunia Advisory 159 of 301 in 2006. 10,357 views.
Release Date:
2006-05-26
Secunia Advisory ID:
SA20283
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
System access
Where:
From remote
Short Description:
Debian has issued an update for awstats. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for mpg123
Vendor Patch. Secunia Advisory 160 of 301 in 2006. 9,011 views.
Release Date:
2006-05-25
Secunia Advisory ID:
SA20275
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for mpg123. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mysql-dfsg
Vendor Patch. Secunia Advisory 161 of 301 in 2006. 10,012 views.
Release Date:
2006-05-23
Secunia Advisory ID:
SA20241
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, disclose potentially sensitive information, and compromise a vulnerable system. [Read More]


Debian update for phpbb2
Vendor Patch. Secunia Advisory 162 of 301 in 2006. 8,372 views.
Release Date:
2006-05-23
Secunia Advisory ID:
SA20197
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for phpbb2. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for nagios
Vendor Patch. Secunia Advisory 163 of 301 in 2006. 9,007 views.
Release Date:
2006-05-23
Secunia Advisory ID:
SA20247
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for nagios. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for fbi
Vendor Patch. Secunia Advisory 164 of 301 in 2006. 7,533 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20166
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for fbi. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for kernel-patch-vserver
Vendor Patch. Secunia Advisory 165 of 301 in 2006. 7,718 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20206
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for kernel-patch-vserver. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 166 of 301 in 2006. 8,639 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20221
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
DoS
Where:
From local network
Short Description:
Debian has issued an update for quagga. This fixes two security issues and a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to bypass certain security restrictions and to disclose system information. [Read More]


Debian update for cscope
Vendor Patch. Secunia Advisory 167 of 301 in 2006. 8,712 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20191
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for cscope. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Debian update for hostapd
Vendor Patch. Secunia Advisory 168 of 301 in 2006. 8,706 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20195
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Debian has issued an update for hostapd. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for popfile
Vendor Patch. Secunia Advisory 169 of 301 in 2006. 8,583 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20205
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for popfile. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for phpgroupware
Vendor Patch. Secunia Advisory 170 of 301 in 2006. 8,222 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20203
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for phpgroupware. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for awstats
Vendor Patch. Secunia Advisory 171 of 301 in 2006. 10,407 views.
Release Date:
2006-05-19
Secunia Advisory ID:
SA20170
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for awstats. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for phpldapadmin
Vendor Patch. Secunia Advisory 172 of 301 in 2006. 8,648 views.
Release Date:
2006-05-16
Secunia Advisory ID:
SA20124
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for phpldapadmin. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian xmcdconfig Insecure Directory Permissions
Vendor Patch. Secunia Advisory 173 of 301 in 2006. 8,814 views.
Release Date:
2006-05-16
Secunia Advisory ID:
SA20078
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
Justin B Rye has discovered a security issue in xmcdconfig, which can be exploited by malicious, local users to bypass certain security restrictions and potentially cause a DoS (Denial of Service). [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 174 of 301 in 2006. 7,892 views.
Release Date:
2006-05-15
Secunia Advisory ID:
SA20108
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes a weakness, which can be exploited by malicious people to identify valid user accounts. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 175 of 301 in 2006. 9,249 views.
Release Date:
2006-05-11
Secunia Advisory ID:
SA20070
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for tiff
Vendor Patch. Secunia Advisory 176 of 301 in 2006. 8,734 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20021
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 177 of 301 in 2006. 8,960 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA20015
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for cgiirc
Vendor Patch. Secunia Advisory 178 of 301 in 2006. 8,524 views.
Release Date:
2006-05-08
Secunia Advisory ID:
SA19985
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cgiirc. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 179 of 301 in 2006. 11,521 views.
Release Date:
2006-05-04
Secunia Advisory ID:
SA19941
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of system information
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and phishing attacks, potentially disclose sensitive information, cause a DoS (Denial of Service), and potentially compromise a user's system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 180 of 301 in 2006. 8,126 views.
Release Date:
2006-05-04
Secunia Advisory ID:
SA19963
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for ethereal
Vendor Patch. Secunia Advisory 181 of 301 in 2006. 9,935 views.
Release Date:
2006-05-04
Secunia Advisory ID:
SA19962
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ethereal. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for resmgr
Vendor Patch. Secunia Advisory 182 of 301 in 2006. 7,861 views.
Release Date:
2006-05-01
Secunia Advisory ID:
SA19898
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued an update for resmgr. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 183 of 301 in 2006. 8,771 views.
Release Date:
2006-05-01
Secunia Advisory ID:
SA19872
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious users to disclose sensitive information, and by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 184 of 301 in 2006. 13,260 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19863
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, disclose sensitive information, and potentially compromise a user's system. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 185 of 301 in 2006. 14,019 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19862
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and phishing attacks, bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of Service), and potentially compromise a user's system. [Read More]


Debian update for openvpn
Vendor Patch. Secunia Advisory 186 of 301 in 2006. 8,088 views.
Release Date:
2006-04-27
Secunia Advisory ID:
SA19837
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openvpn. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for abcmidi
Vendor Patch. Secunia Advisory 187 of 301 in 2006. 7,962 views.
Release Date:
2006-04-26
Secunia Advisory ID:
SA19829
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for abcmidi. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for cyrus-sasl2
Vendor Patch. Secunia Advisory 188 of 301 in 2006. 8,330 views.
Release Date:
2006-04-26
Secunia Advisory ID:
SA19825
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for cyrus-sasl2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for abc2ps
Vendor Patch. Secunia Advisory 189 of 301 in 2006. 8,752 views.
Release Date:
2006-04-25
Secunia Advisory ID:
SA19807
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for abc2ps. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for blender
Vendor Patch. Secunia Advisory 190 of 301 in 2006. 9,310 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19754
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for blender. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially to compromise a user's system. [Read More]


Debian update for xzgv
Vendor Patch. Secunia Advisory 191 of 301 in 2006. 8,266 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19790
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xzgv. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for zgv
Vendor Patch. Secunia Advisory 192 of 301 in 2006. 8,491 views.
Release Date:
2006-04-24
Secunia Advisory ID:
SA19779
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for zgv. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for horde2
Vendor Patch. Secunia Advisory 193 of 301 in 2006. 10,472 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19692
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for horde2. This fixes two vulnerabilities, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system. [Read More]


Debian update for bsdgames
Vendor Patch. Secunia Advisory 194 of 301 in 2006. 9,443 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19687
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for bsdgames. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for fcheck
Vendor Patch. Secunia Advisory 195 of 301 in 2006. 8,490 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19675
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for fcheck. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 196 of 301 in 2006. 12,142 views.
Release Date:
2006-04-13
Secunia Advisory ID:
SA19619
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks, and by malicious people to disclose sensitive information or compromise a vulnerable system. [Read More]


Debian update for zope-cmfplone
Vendor Patch. Secunia Advisory 197 of 301 in 2006. 10,302 views.
Release Date:
2006-04-13
Secunia Advisory ID:
SA19640
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for zope-cmfplone. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain information. [Read More]


Debian mnogosearch Insecure Password Storage Security Issue
Vendor Patch. Secunia Advisory 198 of 301 in 2006. 9,956 views.
Release Date:
2006-04-11
Secunia Advisory ID:
SA19589
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Andrew Pam has discovered a security issue in Debian mnogosearch, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Debian update for libimager-perl
Vendor Patch. Secunia Advisory 199 of 301 in 2006. 8,667 views.
Release Date:
2006-04-10
Secunia Advisory ID:
SA19577
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libimager-perl. This fixes a vulnerability, which can be exploited by malicious people to crash certain applications on a vulnerable system. [Read More]


Debian update for moodle
Vendor Patch. Secunia Advisory 200 of 301 in 2006. 9,977 views.
Release Date:
2006-04-10
Secunia Advisory ID:
SA19591
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of system information
Manipulation of data
Cross Site Scripting
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for moodle. This fixes two security issues and some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, execute arbitrary SQL code, and potentially compromise a vulnerable system. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 201 of 301 in 2006. 9,919 views.
Release Date:
2006-04-10
Secunia Advisory ID:
SA19590
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Exposure of system information
Manipulation of data
Cross Site Scripting
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes two security issues and some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, execute arbitrary SQL code, and potentially compromise a vulnerable system. [Read More]


Debian update for libphp-adodb
Vendor Patch. Secunia Advisory 202 of 301 in 2006. 10,754 views.
Release Date:
2006-04-10
Secunia Advisory ID:
SA19555
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of system information
System access
Where:
From remote
Short Description:
Debian has issued an update for libphp-adodb. This fixes two security issues and some vulnerabilities, which can be exploited by malicious people to disclose system information, conduct cross-site scripting attacks, execute arbitrary SQL code, and potentially compromise a vulnerable system. [Read More]


Debian update for sash
Vendor Patch. Secunia Advisory 203 of 301 in 2006. 9,997 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19550
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for sash. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mailman
Vendor Patch. Secunia Advisory 204 of 301 in 2006. 8,603 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19545
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for mailman. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for dia
Vendor Patch. Secunia Advisory 205 of 301 in 2006. 8,085 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19543
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for dia. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 206 of 301 in 2006. 9,456 views.
Release Date:
2006-04-06
Secunia Advisory ID:
SA19536
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system. [Read More]


Debian update for kaffeine
Vendor Patch. Secunia Advisory 207 of 301 in 2006. 8,965 views.
Release Date:
2006-04-05
Secunia Advisory ID:
SA19540
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kaffeine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for storebackup
Vendor Patch. Secunia Advisory 208 of 301 in 2006. 8,730 views.
Release Date:
2006-04-04
Secunia Advisory ID:
SA19489
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for storebackup. This fixes a vulnerability and a security issue, which potentially can be exploited by malicious, local users to gain access to sensitive information or perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for netpbm-free
Vendor Patch. Secunia Advisory 209 of 301 in 2006. 9,018 views.
Release Date:
2006-03-29
Secunia Advisory ID:
SA19436
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for netpbm-free. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for flex
Vendor Patch. Secunia Advisory 210 of 301 in 2006. 9,001 views.
Release Date:
2006-03-28
Secunia Advisory ID:
SA19424
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for flex. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for kernel-source-2.4.27
Vendor Patch. Secunia Advisory 211 of 301 in 2006. 11,634 views.
Release Date:
2006-03-24
Secunia Advisory ID:
SA19369
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.4.27. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, cause a DoS (Denial of Service), and gain escalated privileges, or by malicious people to cause a DoS and bypass certain security restrictions. [Read More]


Debian update for kernel-source-2.6.8
Vendor Patch. Secunia Advisory 212 of 301 in 2006. 12,030 views.
Release Date:
2006-03-24
Secunia Advisory ID:
SA19374
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.6.8. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), gain escalated privileges, and bypass certain security restrictions, or by malicious people to cause a DoS, bypass certain security restrictions, and disclose certain sensitive information. [Read More]


Debian update for koffice
Vendor Patch. Secunia Advisory 213 of 301 in 2006. 8,561 views.
Release Date:
2006-03-24
Secunia Advisory ID:
SA19364
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
[Read More]


Debian update for evolution
Vendor Patch. Secunia Advisory 214 of 301 in 2006. 11,798 views.
Release Date:
2006-03-24
Secunia Advisory ID:
SA19380
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for evolution. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for sendmail
Vendor Patch. Secunia Advisory 215 of 301 in 2006. 10,317 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19367
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for sendmail. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian Network Installation Insecure Default Directory Permissions
Unpatched. Secunia Advisory 216 of 301 in 2006. 10,974 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19331
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
Ferenczi Viktor has discovered a weakness in Debian, which can be exploited by malicious, local users to bypass certain security restrictions and potentially cause a DoS (Denial of Service). [Read More]


Debian update for firebird2
Vendor Patch. Secunia Advisory 217 of 301 in 2006. 8,120 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19350
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for firebird2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for snmptrapfmt
Vendor Patch. Secunia Advisory 218 of 301 in 2006. 8,828 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19318
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for snmptrapfmt. This fixes a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for kernel-patch-vserver / util-vserver
Vendor Patch. Secunia Advisory 219 of 301 in 2006. 8,616 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19339
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Debian has issued updates for kernel-patch-vserver and util-vserver. This fixes two security issues, which can be exploited by malicious programs to bypass certain security restrictions. [Read More]


Debian update for ilohamail
Vendor Patch. Secunia Advisory 220 of 301 in 2006. 7,724 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19266
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for ilohamail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct script insertion attacks. [Read More]


Debian update for crossfire
Vendor Patch. Secunia Advisory 221 of 301 in 2006. 8,190 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19276
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for crossfire. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system. [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 222 of 301 in 2006. 7,476 views.
Release Date:
2006-03-20
Secunia Advisory ID:
SA19264
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for drupal
Vendor Patch. Secunia Advisory 223 of 301 in 2006. 8,682 views.
Release Date:
2006-03-17
Secunia Advisory ID:
SA19257
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and session fixation attacks, and manipulate outgoing mails. [Read More]


Debian update for xine-lib
Vendor Patch. Secunia Advisory 224 of 301 in 2006. 9,425 views.
Release Date:
2006-03-17
Secunia Advisory ID:
SA19279
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 225 of 301 in 2006. 8,008 views.
Release Date:
2006-03-17
Secunia Advisory ID:
SA19272
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for xpvm
Vendor Patch. Secunia Advisory 226 of 301 in 2006. 9,154 views.
Release Date:
2006-03-17
Secunia Advisory ID:
SA19251
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for xpvm. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian Installer Log Files Information Disclosure
Vendor Patch. Secunia Advisory 227 of 301 in 2006. 13,251 views.
Release Date:
2006-03-15
Secunia Advisory ID:
SA19170
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Joey Hess has reported a vulnerability in Debian, which can be exploited by malicious, local users to disclose sensitive information. [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 228 of 301 in 2006. 9,521 views.
Release Date:
2006-03-15
Secunia Advisory ID:
SA19240
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and conduct SQL injection attacks, and by malicious people to conduct HTTP response splitting attacks. [Read More]


Debian update for crossfire
Vendor Patch. Secunia Advisory 229 of 301 in 2006. 8,905 views.
Release Date:
2006-03-15
Secunia Advisory ID:
SA19194
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for crossfire. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libextractor
Vendor Patch. Secunia Advisory 230 of 301 in 2006. 7,218 views.
Release Date:
2006-03-14
Secunia Advisory ID:
SA19164
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libextractor. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for lurker
Vendor Patch. Secunia Advisory 231 of 301 in 2006. 8,153 views.
Release Date:
2006-03-14
Secunia Advisory ID:
SA19145
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for lurker. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, and disclose and manipulate sensitive information. [Read More]


Debian update for libapreq2-perl
Vendor Patch. Secunia Advisory 232 of 301 in 2006. 8,065 views.
Release Date:
2006-03-14
Secunia Advisory ID:
SA19139
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libapreq2-perl. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for bomberclone
Vendor Patch. Secunia Advisory 233 of 301 in 2006. 8,767 views.
Release Date:
2006-03-14
Secunia Advisory ID:
SA19210
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for bomberclone. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for metamail
Vendor Patch. Secunia Advisory 234 of 301 in 2006. 8,747 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19226
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for metamail. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for freeciv
Vendor Patch. Secunia Advisory 235 of 301 in 2006. 8,762 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19227
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for freeciv. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gnupg
Vendor Patch. Secunia Advisory 236 of 301 in 2006. 8,901 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19234
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for ffmpeg
Vendor Patch. Secunia Advisory 237 of 301 in 2006. 8,505 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19192
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ffmpeg. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for libcrypt-cbc-perl
Vendor Patch. Secunia Advisory 238 of 301 in 2006. 9,344 views.
Release Date:
2006-03-13
Secunia Advisory ID:
SA19187
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for libcrypt-cbc-perl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for zoo
Vendor Patch. Secunia Advisory 239 of 301 in 2006. 8,101 views.
Release Date:
2006-03-10
Secunia Advisory ID:
SA19166
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for zoo. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for bluez-hcidump
Vendor Patch. Secunia Advisory 240 of 301 in 2006. 8,637 views.
Release Date:
2006-03-10
Secunia Advisory ID:
SA19122
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bluez-hcidump. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for zoph
Vendor Patch. Secunia Advisory 241 of 301 in 2006. 8,825 views.
Release Date:
2006-03-10
Secunia Advisory ID:
SA19153
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for zoph. This fixes some vulnerabilities, which potentially can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 242 of 301 in 2006. 10,289 views.
Release Date:
2006-03-09
Secunia Advisory ID:
SA19176
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for tar
Vendor Patch. Secunia Advisory 243 of 301 in 2006. 9,853 views.
Release Date:
2006-03-08
Secunia Advisory ID:
SA19152
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tar. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) and to compromise a user's system. [Read More]


Debian update for libtasn1-2
Vendor Patch. Secunia Advisory 244 of 301 in 2006. 9,375 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19092
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libtasn1-2. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gnutls11
Vendor Patch. Secunia Advisory 245 of 301 in 2006. 8,981 views.
Release Date:
2006-03-06
Secunia Advisory ID:
SA19080
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gnutls11. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 246 of 301 in 2006. 9,225 views.
Release Date:
2006-03-02
Secunia Advisory ID:
SA19091
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
[Read More]


Debian update for pdftohtml
Vendor Patch. Secunia Advisory 247 of 301 in 2006. 8,693 views.
Release Date:
2006-02-28
Secunia Advisory ID:
SA19021
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
[Read More]


Debian update for gpdf
Vendor Patch. Secunia Advisory 248 of 301 in 2006. 8,352 views.
Release Date:
2006-02-28
Secunia Advisory ID:
SA19065
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
[Read More]


Debian update for bmv
Vendor Patch. Secunia Advisory 249 of 301 in 2006. 9,019 views.
Release Date:
2006-02-28
Secunia Advisory ID:
SA19029
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for bmv. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for tutos
Vendor Patch. Secunia Advisory 250 of 301 in 2006. 8,043 views.
Release Date:
2006-02-23
Secunia Advisory ID:
SA18954
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for tutos. This fixes some vulnerabilities, which can be exploited to conduct SQL injection and cross-site scripting attacks. [Read More]


Debian update for pdfkit.framework
Vendor Patch. Secunia Advisory 251 of 301 in 2006. 8,742 views.
Release Date:
2006-02-20
Secunia Advisory ID:
SA18948
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From remote
Short Description:
[Read More]


Debian update for gnupg
Vendor Patch. Secunia Advisory 252 of 301 in 2006. 11,440 views.
Release Date:
2006-02-17
Secunia Advisory ID:
SA18934
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for gnupg. This fixes a security issue, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for heimdal
Vendor Patch. Secunia Advisory 253 of 301 in 2006. 9,108 views.
Release Date:
2006-02-16
Secunia Advisory ID:
SA18894
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
From local network
Short Description:
Debian has issued an update for heimdal. This fixes two vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libast
Vendor Patch. Secunia Advisory 254 of 301 in 2006. 9,876 views.
Release Date:
2006-02-16
Secunia Advisory ID:
SA18916
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libast. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for nfs-user-server
Vendor Patch. Secunia Advisory 255 of 301 in 2006. 10,792 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18889
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for nfs-user-server. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for pdfkit.framework
Vendor Patch. Secunia Advisory 256 of 301 in 2006. 10,601 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18882
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pdfkit.framework. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for otrs
Vendor Patch. Secunia Advisory 257 of 301 in 2006. 10,528 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18887
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for otrs. This fixes some vulnerabilities, which can be exploited by malicious people to conduct SQL injection, script insertion, and cross-site scripting attacks. [Read More]


Debian update for gpdf
Vendor Patch. Secunia Advisory 258 of 301 in 2006. 9,559 views.
Release Date:
2006-02-15
Secunia Advisory ID:
SA18875
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 259 of 301 in 2006. 9,532 views.
Release Date:
2006-02-14
Secunia Advisory ID:
SA18834
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for kronolith
Vendor Patch. Secunia Advisory 260 of 301 in 2006. 8,853 views.
Release Date:
2006-02-14
Secunia Advisory ID:
SA18827
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for kronolith. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks. [Read More]


Debian update for noweb
Vendor Patch. Secunia Advisory 261 of 301 in 2006. 9,500 views.
Release Date:
2006-02-13
Secunia Advisory ID:
SA18812
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for noweb. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for scponly
Vendor Patch. Secunia Advisory 262 of 301 in 2006. 9,606 views.
Release Date:
2006-02-13
Secunia Advisory ID:
SA18829
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for scponly. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for elog
Vendor Patch. Secunia Advisory 263 of 301 in 2006. 10,942 views.
Release Date:
2006-02-10
Secunia Advisory ID:
SA18783
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for elog. This fixes some vulnerabilities and a security issue, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), bypass certain security restrictions, and potentially compromise a vulnerable system. [Read More]


Debian update for adzapper
Vendor Patch. Secunia Advisory 264 of 301 in 2006. 9,460 views.
Release Date:
2006-02-10
Secunia Advisory ID:
SA18777
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for adzapper. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for ipsec-tools
Vendor Patch. Secunia Advisory 265 of 301 in 2006. 10,851 views.
Release Date:
2006-02-06
Secunia Advisory ID:
SA18742
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mydns
Vendor Patch. Secunia Advisory 266 of 301 in 2006. 10,278 views.
Release Date:
2006-02-03
Secunia Advisory ID:
SA18641
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for mydns. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gnocatan
Vendor Patch. Secunia Advisory 267 of 301 in 2006. 9,182 views.
Release Date:
2006-02-03
Secunia Advisory ID:
SA18692
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gnocatan. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for pdftohtml
Vendor Patch. Secunia Advisory 268 of 301 in 2006. 12,003 views.
Release Date:
2006-02-01
Secunia Advisory ID:
SA18675
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pdftohtml. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for pdfkit.framework
Vendor Patch. Secunia Advisory 269 of 301 in 2006. 11,567 views.
Release Date:
2006-02-01
Secunia Advisory ID:
SA18679
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pdfkit.framework. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system. [Read More]


Debian update for libmail-audit-perl
Vendor Patch. Secunia Advisory 270 of 301 in 2006. 11,085 views.
Release Date:
2006-01-31
Secunia Advisory ID:
SA18656
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libmail-audit-perl. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for unalz
Vendor Patch. Secunia Advisory 271 of 301 in 2006. 9,137 views.
Release Date:
2006-01-31
Secunia Advisory ID:
SA18665
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for unalz. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for drupal
Vendor Patch. Secunia Advisory 272 of 301 in 2006. 10,986 views.
Release Date:
2006-01-27
Secunia Advisory ID:
SA18630
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for drupal. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, and conduct script insertion and HTTP response splitting attacks. [Read More]


Debian update for imagemagick
Vendor Patch. Secunia Advisory 273 of 301 in 2006. 10,529 views.
Release Date:
2006-01-27
Secunia Advisory ID:
SA18631
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for imagemagick. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for mailman
Vendor Patch. Secunia Advisory 274 of 301 in 2006. 11,097 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18612
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for mailman. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for lsh-utils
Vendor Patch. Secunia Advisory 275 of 301 in 2006. 10,615 views.
Release Date:
2006-01-26
Secunia Advisory ID:
SA18623
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Debian has issued an update for lsh-utils. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information or to cause a DoS (Denial of Service). [Read More]


Debian update for flyspray
Vendor Patch. Secunia Advisory 276 of 301 in 2006. 9,244 views.
Release Date:
2006-01-25
Secunia Advisory ID:
SA18606
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for flyspray. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for wine
Vendor Patch. Secunia Advisory 277 of 301 in 2006. 10,897 views.
Release Date:
2006-01-25
Secunia Advisory ID:
SA18578
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for wine. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for kdelibs
Vendor Patch. Secunia Advisory 278 of 301 in 2006. 9,230 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18561
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kdelibs. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Debian update for crawl
Vendor Patch. Secunia Advisory 279 of 301 in 2006. 8,743 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18573
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for crawl. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for cupsys
Vendor Patch. Secunia Advisory 280 of 301 in 2006. 9,876 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18582
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for cupsys. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for trac
Vendor Patch. Secunia Advisory 281 of 301 in 2006. 9,120 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18555
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for trac. This fixes two vulnerabilities, which can be exploited by malicious people to conduct script insertion and SQL injection attacks. [Read More]


Debian update for libapache-auth-ldap
Vendor Patch. Secunia Advisory 282 of 301 in 2006. 10,602 views.
Release Date:
2006-01-23
Secunia Advisory ID:
SA18568
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libapache-auth-ldap. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 283 of 301 in 2006. 10,518 views.
Release Date:
2006-01-20
Secunia Advisory ID:
SA18548
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for sudo
Vendor Patch. Secunia Advisory 284 of 301 in 2006. 10,046 views.
Release Date:
2006-01-20
Secunia Advisory ID:
SA18558
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for sudo. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for mantis
Vendor Patch. Secunia Advisory 285 of 301 in 2006. 10,646 views.
Release Date:
2006-01-18
Secunia Advisory ID:
SA18481
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for mantis. This fixes some vulnerabilities, where some have unknown impacts and others potentially can be exploited by malicious people to conduct cross-site scripting, HTTP response splitting, and SQL injection attacks, and disclose sensitive information. [Read More]


Debian update for antiword
Vendor Patch. Secunia Advisory 286 of 301 in 2006. 9,228 views.
Release Date:
2006-01-18
Secunia Advisory ID:
SA18530
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for antiword. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for albatross
Vendor Patch. Secunia Advisory 287 of 301 in 2006. 9,474 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18496
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for albatross. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for perl
Vendor Patch. Secunia Advisory 288 of 301 in 2006. 9,071 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18413
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for perl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable Perl application. [Read More]


Debian update for tuxpaint
Vendor Patch. Secunia Advisory 289 of 301 in 2006. 8,879 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18476
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for tuxpaint. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. [Read More]


Debian update for fetchmail
Vendor Patch. Secunia Advisory 290 of 301 in 2006. 8,789 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18433
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for fetchmail. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for koffice
Vendor Patch. Secunia Advisory 291 of 301 in 2006. 8,779 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18147
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for koffice. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for gpdf
Vendor Patch. Secunia Advisory 292 of 301 in 2006. 9,488 views.
Release Date:
2006-01-13
Secunia Advisory ID:
SA18436
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for tetex-bin
Vendor Patch. Secunia Advisory 293 of 301 in 2006. 8,769 views.
Release Date:
2006-01-12
Secunia Advisory ID:
SA18428
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for tetex-bin. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for libextractor
Vendor Patch. Secunia Advisory 294 of 301 in 2006. 10,513 views.
Release Date:
2006-01-12
Secunia Advisory ID:
SA18407
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libextractor. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for libapache2-mod-auth-pgsql
Vendor Patch. Secunia Advisory 295 of 301 in 2006. 9,263 views.
Release Date:
2006-01-11
Secunia Advisory ID:
SA18397
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libapache2-mod-auth-pgsql. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for petris
Vendor Patch. Secunia Advisory 296 of 301 in 2006. 8,149 views.
Release Date:
2006-01-10
Secunia Advisory ID:
SA18384
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for petris. This fixes a vulnerability, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for pound
Vendor Patch. Secunia Advisory 297 of 301 in 2006. 8,991 views.
Release Date:
2006-01-10
Secunia Advisory ID:
SA18381
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pound. This fixes two vulnerabilities, which potentially can be exploited by malicious people to conduct HTTP request smuggling attacks and to compromise a vulnerable system. [Read More]


Debian update for hylafax
Vendor Patch. Secunia Advisory 298 of 301 in 2006. 8,525 views.
Release Date:
2006-01-10
Secunia Advisory ID:
SA18366
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for hylafax. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Debian update for xpdf
Vendor Patch. Secunia Advisory 299 of 301 in 2006. 9,479 views.
Release Date:
2006-01-10
Secunia Advisory ID:
SA18385
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for xpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for kpdf
Vendor Patch. Secunia Advisory 300 of 301 in 2006. 9,155 views.
Release Date:
2006-01-10
Secunia Advisory ID:
SA18389
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for kpdf. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. [Read More]


Debian update for smstools
Vendor Patch. Secunia Advisory 301 of 301 in 2006. 8,381 views.
Release Date:
2006-01-09
Secunia Advisory ID:
SA18357
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for smstools. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially to gain escalated privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 3.1 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer