Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Debian GNU/Linux 3.1

This vulnerability report for Debian GNU/Linux 3.1 contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Debian GNU/Linux 3.1 then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Debian

Product Link View Here (Link to external site)

Affected By 639 Secunia advisories
1712 Vulnerabilities

Monitor Product Receive alerts for this product





111 Secunia Advisories in 2007

Secunia has issued a total of 111 Secunia advisories in 2007 for Debian GNU/Linux 3.1. Currently, 0% (0 out of 111) are marked as unpatched.

More information about the specific Secunia advisories affecting Debian GNU/Linux 3.1 can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Debian update for ruby-gnome2
Vendor Patch. Secunia Advisory 1 of 111 in 2007. 5,820 views.
Release Date:
2007-12-12
Secunia Advisory ID:
SA28060
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for ruby-gnome2. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for libnss-ldap
Vendor Patch. Secunia Advisory 2 of 111 in 2007. 6,521 views.
Release Date:
2007-12-12
Secunia Advisory ID:
SA28061
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for nss-ldap. This fixes a security issue, which can be exploited by malicious persons to manipulate certain data. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 3 of 111 in 2007. 4,942 views.
Release Date:
2007-12-11
Secunia Advisory ID:
SA27999
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for sitebar
Vendor Patch. Secunia Advisory 4 of 111 in 2007. 6,493 views.
Release Date:
2007-12-10
Secunia Advisory ID:
SA28008
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for sitebar. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, and by malicious users to disclose potentially sensitive information and compromise a vulnerable system. [Read More]


Debian update for qt-x11-free
Vendor Patch. Secunia Advisory 5 of 111 in 2007. 5,579 views.
Release Date:
2007-12-10
Secunia Advisory ID:
SA27996
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for qt-x11-free. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library. [Read More]


Debian update for wesnoth
Vendor Patch. Secunia Advisory 6 of 111 in 2007. 5,584 views.
Release Date:
2007-12-06
Secunia Advisory ID:
SA27943
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From remote
Short Description:
Debian has issued an update for wesnoth. This fixes a vulnerability, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 7 of 111 in 2007. 6,427 views.
Release Date:
2007-12-03
Secunia Advisory ID:
SA27892
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 8 of 111 in 2007. 6,843 views.
Release Date:
2007-12-03
Secunia Advisory ID:
SA27891
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for tk8.3
Partial Fix. Secunia Advisory 9 of 111 in 2007. 7,682 views.
Release Date:
2007-11-28
Secunia Advisory ID:
SA27806
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for tk8.3. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for tk8.4
Vendor Patch. Secunia Advisory 10 of 111 in 2007. 7,767 views.
Release Date:
2007-11-28
Secunia Advisory ID:
SA27801
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tk8.4. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for wireshark
Vendor Patch. Secunia Advisory 11 of 111 in 2007. 7,852 views.
Release Date:
2007-11-27
Secunia Advisory ID:
SA27817
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for mysql-dfsg, mysql-dfsg-5.0, and mysql-dfsg-4.1
Vendor Patch. Secunia Advisory 12 of 111 in 2007. 7,798 views.
Release Date:
2007-11-27
Secunia Advisory ID:
SA27823
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
From local network
Short Description:
Debian has issued an update for mysql-dfsg, mysql-dfsg-5.0, and mysql-dfsg-4.1. This fixes some security issues and vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions, gain escalated privileges, or cause a DoS (Denial of Service), and by malicious people to cause a DoS. [Read More]


Debian update for ruby1.8
Vendor Patch. Secunia Advisory 13 of 111 in 2007. 6,035 views.
Release Date:
2007-11-26
Secunia Advisory ID:
SA27764
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for ruby1.8. This fixes some security issues, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for libopenssl-ruby
Vendor Patch. Secunia Advisory 14 of 111 in 2007. 7,019 views.
Release Date:
2007-11-26
Secunia Advisory ID:
SA27769
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for libopenssl-ruby. This fixes some security issues, which can be exploited by malicious people to conduct spoofing attacks. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 15 of 111 in 2007. 10,608 views.
Release Date:
2007-11-23
Secunia Advisory ID:
SA27787
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for kdegraphics
Partial Fix. Secunia Advisory 16 of 111 in 2007. 9,439 views.
Release Date:
2007-11-22
Secunia Advisory ID:
SA27772
Solution Status:
Partial Fix
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for horde3
Vendor Patch. Secunia Advisory 17 of 111 in 2007. 6,454 views.
Release Date:
2007-11-12
Secunia Advisory ID:
SA27565
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for horde3. This fixes some vulnerabilities, which can be exploited by malicious people to conduct phishing and cross-site scripting attacks. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 18 of 111 in 2007. 7,736 views.
Release Date:
2007-11-09
Secunia Advisory ID:
SA27595
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 19 of 111 in 2007. 6,052 views.
Release Date:
2007-11-08
Secunia Advisory ID:
SA27549
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Debian has issued an update for gforge. This fixes a security issue, which can be exploited by malicious, local users to truncate arbitrary files. [Read More]


Debian update for perl
Vendor Patch. Secunia Advisory 20 of 111 in 2007. 5,497 views.
Release Date:
2007-11-07
Secunia Advisory ID:
SA27479
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for perl. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for pcre3
Vendor Patch. Secunia Advisory 21 of 111 in 2007. 7,503 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27538
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for pcre3. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose sensitive information, or potentially compromise an application using the library. [Read More]


Debian update for perdition
Vendor Patch. Secunia Advisory 22 of 111 in 2007. 6,249 views.
Release Date:
2007-11-06
Secunia Advisory ID:
SA27520
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for perdition. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for t1lib
Vendor Patch. Secunia Advisory 23 of 111 in 2007. 7,951 views.
Release Date:
2007-10-19
Secunia Advisory ID:
SA27297
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for t1lib. This fixes a vulnerability, which can be exploited by malicious users to potentially compromise a vulnerable system. [Read More]


Debian update for zoph
Vendor Patch. Secunia Advisory 24 of 111 in 2007. 7,717 views.
Release Date:
2007-10-19
Secunia Advisory ID:
SA27303
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for zoph. This fixes a vulnerability, which can be exploited by malicious users to conduct SQL injection attacks. [Read More]


Debian update for dhcp
Partial Fix. Secunia Advisory 25 of 111 in 2007. 8,372 views.
Release Date:
2007-10-19
Secunia Advisory ID:
SA27273
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for wesnoth
Vendor Patch. Secunia Advisory 26 of 111 in 2007. 5,944 views.
Release Date:
2007-10-15
Secunia Advisory ID:
SA27241
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for wesnoth. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for xfs
Vendor Patch. Secunia Advisory 27 of 111 in 2007. 6,163 views.
Release Date:
2007-10-10
Secunia Advisory ID:
SA27168
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for xfs. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 28 of 111 in 2007. 6,970 views.
Release Date:
2007-10-05
Secunia Advisory ID:
SA27042
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for gforge. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 29 of 111 in 2007. 7,404 views.
Release Date:
2007-10-03
Secunia Advisory ID:
SA27049
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for openssl
Vendor Patch. Secunia Advisory 30 of 111 in 2007. 7,800 views.
Release Date:
2007-10-03
Secunia Advisory ID:
SA27031
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openssl, openssl097 and openssl096. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 31 of 111 in 2007. 5,919 views.
Release Date:
2007-09-18
Secunia Advisory ID:
SA26817
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for gforge
Vendor Patch. Secunia Advisory 32 of 111 in 2007. 6,860 views.
Release Date:
2007-09-11
Secunia Advisory ID:
SA26723
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From remote
Short Description:
Debian has issued an update for gforge. This fixes a vulnerability, which can be exploited by malicious people to conduct SQL injection attacks. [Read More]


Debian update for phpmyadmin
Vendor Patch. Secunia Advisory 33 of 111 in 2007. 9,352 views.
Release Date:
2007-09-10
Secunia Advisory ID:
SA26733
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks. [Read More]


Debian debian-goodies Command Execution Vulnerability
Vendor Patch. Secunia Advisory 34 of 111 in 2007. 11,918 views.
Release Date:
2007-09-06
Secunia Advisory ID:
SA26675
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Thomas de Grenier de Latour has discovered a vulnerability in the debian-goodies package for Debian Linux, which can be exploited by malicious, local users to perform actions with escalated privileges. [Read More]


Debian update for clamav
Partial Fix. Secunia Advisory 35 of 111 in 2007. 7,871 views.
Release Date:
2007-09-03
Secunia Advisory ID:
SA26654
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Debian update for id3lib3.8.3
Vendor Patch. Secunia Advisory 36 of 111 in 2007. 7,836 views.
Release Date:
2007-09-03
Secunia Advisory ID:
SA26646
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for id3lib3.8.3. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for vim
Vendor Patch. Secunia Advisory 37 of 111 in 2007. 6,927 views.
Release Date:
2007-09-03
Secunia Advisory ID:
SA26653
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vim. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for asterisk
Vendor Patch. Secunia Advisory 38 of 111 in 2007. 8,605 views.
Release Date:
2007-08-27
Secunia Advisory ID:
SA26602
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for asterisk. This fixes some vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, and by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for koffice
Partial Fix. Secunia Advisory 39 of 111 in 2007. 7,581 views.
Release Date:
2007-08-21
Secunia Advisory ID:
SA26514
Solution Status:
Partial Fix
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for koffice. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for gpdf
Vendor Patch. Secunia Advisory 40 of 111 in 2007. 7,709 views.
Release Date:
2007-08-14
Secunia Advisory ID:
SA26432
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gpdf. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for kdegraphics
Vendor Patch. Secunia Advisory 41 of 111 in 2007. 6,278 views.
Release Date:
2007-08-14
Secunia Advisory ID:
SA26410
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for kdegraphics. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for tcpdump
Vendor Patch. Secunia Advisory 42 of 111 in 2007. 8,167 views.
Release Date:
2007-08-13
Secunia Advisory ID:
SA26404
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for pdfkit.framework
Vendor Patch. Secunia Advisory 43 of 111 in 2007. 7,994 views.
Release Date:
2007-08-08
Secunia Advisory ID:
SA26365
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for pdfkit.framework. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for bochs
Vendor Patch. Secunia Advisory 44 of 111 in 2007. 7,685 views.
Release Date:
2007-08-08
Secunia Advisory ID:
SA26364
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
Local system
Short Description:
Debian has issued an update for bochs. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for tetex-bin
Vendor Patch. Secunia Advisory 45 of 111 in 2007. 7,985 views.
Release Date:
2007-08-07
Secunia Advisory ID:
SA26343
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for tetex-bin. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for libextractor
Vendor Patch. Secunia Advisory 46 of 111 in 2007. 7,865 views.
Release Date:
2007-08-06
Secunia Advisory ID:
SA26342
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for libextractor. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library. [Read More]


Debian update for file
Vendor Patch. Secunia Advisory 47 of 111 in 2007. 7,802 views.
Release Date:
2007-08-01
Secunia Advisory ID:
SA26294
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for file. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for xfs
Partial Fix. Secunia Advisory 48 of 111 in 2007. 7,601 views.
Release Date:
2007-07-31
Secunia Advisory ID:
SA26282
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for xfs. This fixes a vulnerability, which can be exploited by malicious, local users to perform actions with escalated privileges. [Read More]


Debian update for bind
Vendor Patch. Secunia Advisory 49 of 111 in 2007. 7,957 views.
Release Date:
2007-07-27
Secunia Advisory ID:
SA26180
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
Debian has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 50 of 111 in 2007. 9,768 views.
Release Date:
2007-07-23
Secunia Advisory ID:
SA25588
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Spoofing
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and spoofing attacks, gain knowledge of sensitive information, and potentially compromise a user's system. [Read More]


Debian update for gimp
Vendor Patch. Secunia Advisory 51 of 111 in 2007. 6,739 views.
Release Date:
2007-07-19
Secunia Advisory ID:
SA26132
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gimp. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for freetype
Vendor Patch. Secunia Advisory 52 of 111 in 2007. 7,360 views.
Release Date:
2007-07-19
Secunia Advisory ID:
SA26129
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for freetype. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 53 of 111 in 2007. 6,733 views.
Release Date:
2007-07-10
Secunia Advisory ID:
SA25980
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for php4
Vendor Patch. Secunia Advisory 54 of 111 in 2007. 7,296 views.
Release Date:
2007-07-09
Secunia Advisory ID:
SA25945
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for php4. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system. [Read More]


Debian update for gfax
Vendor Patch. Secunia Advisory 55 of 111 in 2007. 10,466 views.
Release Date:
2007-07-06
Secunia Advisory ID:
SA25967
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for gfax. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for fireflier-server
Vendor Patch. Secunia Advisory 56 of 111 in 2007. 7,342 views.
Release Date:
2007-07-02
Secunia Advisory ID:
SA25913
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
Debian has issued an update for fireflier-server. This fixes a security issue, which can be exploited by malicious, local users to delete arbitrary files. [Read More]


Debian update for evolution
Partial Fix. Secunia Advisory 57 of 111 in 2007. 6,596 views.
Release Date:
2007-07-02
Secunia Advisory ID:
SA25880
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for evolution. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 58 of 111 in 2007. 9,500 views.
Release Date:
2007-06-29
Secunia Advisory ID:
SA25890
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 59 of 111 in 2007. 6,937 views.
Release Date:
2007-06-25
Secunia Advisory ID:
SA25796
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libapache-mod-jk
Vendor Patch. Secunia Advisory 60 of 111 in 2007. 8,440 views.
Release Date:
2007-06-18
Secunia Advisory ID:
SA25701
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for libapache-mod-jk. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Debian update for libexif
Vendor Patch. Secunia Advisory 61 of 111 in 2007. 8,046 views.
Release Date:
2007-06-18
Secunia Advisory ID:
SA25717
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libexif. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. [Read More]


Debian update for postgresql-7.4
Vendor Patch. Secunia Advisory 62 of 111 in 2007. 6,626 views.
Release Date:
2007-06-18
Secunia Advisory ID:
SA25725
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From local network
Short Description:
Debian has issued an update for postgresql-7.4. This fixes a security issue, which can be exploited by malicious users to gain escalated privileges. [Read More]


Debian update for kernel-source-2.6.8
Vendor Patch. Secunia Advisory 63 of 111 in 2007. 8,520 views.
Release Date:
2007-06-18
Secunia Advisory ID:
SA25714
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Debian has issued an update for kernel-source-2.6.8. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Debian update for iceweasel
Partial Fix. Secunia Advisory 64 of 111 in 2007. 9,482 views.
Release Date:
2007-06-15
Secunia Advisory ID:
SA25685
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a vulnerable system. [Read More]


Debian update for icedove
Partial Fix. Secunia Advisory 65 of 111 in 2007. 7,263 views.
Release Date:
2007-06-14
Secunia Advisory ID:
SA25664
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for icedove. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system. [Read More]


Debian update for openoffice
Vendor Patch. Secunia Advisory 66 of 111 in 2007. 6,677 views.
Release Date:
2007-06-13
Secunia Advisory ID:
SA25650
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for gimp
Vendor Patch. Secunia Advisory 67 of 111 in 2007. 5,953 views.
Release Date:
2007-06-11
Secunia Advisory ID:
SA25573
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for gimp. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for iceape
Partial Fix. Secunia Advisory 68 of 111 in 2007. 9,038 views.
Release Date:
2007-06-08
Secunia Advisory ID:
SA25559
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for iceape. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system. [Read More]


Debian update for php4
Vendor Patch. Secunia Advisory 69 of 111 in 2007. 5,511 views.
Release Date:
2007-05-22
Secunia Advisory ID:
SA25365
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for php4. This fixes a vulnerability, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Debian update for xfree86
Vendor Patch. Secunia Advisory 70 of 111 in 2007. 6,364 views.
Release Date:
2007-05-18
Secunia Advisory ID:
SA25305
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Debian has issued an update for xfree86. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose sensitive information, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Debian update for quagga
Vendor Patch. Secunia Advisory 71 of 111 in 2007. 7,338 views.
Release Date:
2007-05-17
Secunia Advisory ID:
SA25293
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for quagga. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Debian update for squirrelmail
Vendor Patch. Secunia Advisory 72 of 111 in 2007. 8,057 views.
Release Date:
2007-05-15
Secunia Advisory ID:
SA25236
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks. [Read More]


Debian update for ldap-account-manager
Vendor Patch. Secunia Advisory 73 of 111 in 2007. 7,807 views.
Release Date:
2007-05-08
Secunia Advisory ID:
SA25157
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Privilege escalation
Where:
From remote
Short Description:
Debian has issued an update for ldap-account-manager. This fixes some vulnerabilities, which can be exploited by malicious, local users to perform actions with escalated privileges and by malicious users to conduct script insertion attacks. [Read More]


Debian update for qemu
Vendor Patch. Secunia Advisory 74 of 111 in 2007. 10,060 views.
Release Date:
2007-05-01
Secunia Advisory ID:
SA25095
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Debian has issued an update for qemu. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and cause a DoS (Denial of Service). [Read More]


Debian update for php4
Vendor Patch. Secunia Advisory 75 of 111 in 2007. 8,428 views.
Release Date:
2007-04-30
Secunia Advisory ID:
SA25025
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Debian has issued an update for php4. This fixes some vulnerabilities, which can be exploited by malicious, local users to bypass certain security restrictions, malicious users to disclose potentially sensitive information or compromise a vulnerable system, and by malicious people to compromise a vulnerable system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 76 of 111 in 2007. 8,618 views.
Release Date:
2007-04-30
Secunia Advisory ID:
SA25028
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes some vulnerabilities, where one has an unknown impact and the others can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 77 of 111 in 2007. 7,654 views.
Release Date:
2007-04-23
Secunia Advisory ID:
SA24974
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Debian update for man-db
Vendor Patch. Secunia Advisory 78 of 111 in 2007. 7,392 views.
Release Date:
2007-04-09
Secunia Advisory ID:
SA24828
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for man-db. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for xmms
Vendor Patch. Secunia Advisory 79 of 111 in 2007. 7,532 views.
Release Date:
2007-04-09
Secunia Advisory ID:
SA24804
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for xmms. This fixes two vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for krb5
Vendor Patch. Secunia Advisory 80 of 111 in 2007. 7,263 views.
Release Date:
2007-04-04
Secunia Advisory ID:
SA24736
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and by malicious users to cause a DoS (Denial of Service) or to compromise a vulnerable system. [Read More]


Debian update for zope2.7
Vendor Patch. Secunia Advisory 81 of 111 in 2007. 7,780 views.
Release Date:
2007-04-03
Secunia Advisory ID:
SA24713
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
Debian has issued an update for zope2.7. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site request forgery attacks. [Read More]


Debian update for file
Vendor Patch. Secunia Advisory 82 of 111 in 2007. 7,762 views.
Release Date:
2007-04-03
Secunia Advisory ID:
SA24723
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
DoS
Where:
From remote
Short Description:
Debian has issued an update for file. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for nas
Vendor Patch. Secunia Advisory 83 of 111 in 2007. 7,639 views.
Release Date:
2007-03-28
Secunia Advisory ID:
SA24638
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Debian has issued an update for nas. This fixes some vulnerabilities, which potentially can be exploited by malicious, local users to gain escalated privileges or malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for tcpdump
Vendor Patch. Secunia Advisory 84 of 111 in 2007. 8,402 views.
Release Date:
2007-03-23
Secunia Advisory ID:
SA24610
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 85 of 111 in 2007. 8,160 views.
Release Date:
2007-03-21
Secunia Advisory ID:
SA24613
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for openafs
Vendor Patch. Secunia Advisory 86 of 111 in 2007. 6,622 views.
Release Date:
2007-03-21
Secunia Advisory ID:
SA24607
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
From local network
Short Description:
Debian has issued an update for openafs. This fixes a vulnerability, which can be exploited by malicious users to gain escalated privileges. [Read More]


Debian update for lookup-el
Vendor Patch. Secunia Advisory 87 of 111 in 2007. 8,684 views.
Release Date:
2007-03-19
Secunia Advisory ID:
SA24590
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for lookup-el. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges. [Read More]


Debian update for libwpd
Vendor Patch. Secunia Advisory 88 of 111 in 2007. 8,043 views.
Release Date:
2007-03-19
Secunia Advisory ID:
SA24572
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for libwpd. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise an application using the library. [Read More]


Debian update for webcalendar
Vendor Patch. Secunia Advisory 89 of 111 in 2007. 7,566 views.
Release Date:
2007-03-16
Secunia Advisory ID:
SA24519
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for webcalendar. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for gnupg
Vendor Patch. Secunia Advisory 90 of 111 in 2007. 7,889 views.
Release Date:
2007-03-14
Secunia Advisory ID:
SA24511
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Debian has issued an update for gnupg. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions when applications use GnuPG in an insecure manner. [Read More]


Debian update for mozilla
Vendor Patch. Secunia Advisory 91 of 111 in 2007. 8,591 views.
Release Date:
2007-03-12
Secunia Advisory ID:
SA24390
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially compromise a user's system. [Read More]


Debian update for php4
Vendor Patch. Secunia Advisory 92 of 111 in 2007. 7,827 views.
Release Date:
2007-03-08
Secunia Advisory ID:
SA24421
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for php4. This fixes some vulnerabilities and a weakness, which can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for clamav
Vendor Patch. Secunia Advisory 93 of 111 in 2007. 7,756 views.
Release Date:
2007-03-07
Secunia Advisory ID:
SA24425
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for clamav. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for gnomemeeting and ekiga
Vendor Patch. Secunia Advisory 94 of 111 in 2007. 8,803 views.
Release Date:
2007-03-05
Secunia Advisory ID:
SA24379
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for gnomemeeting and ekiga. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system. [Read More]


Debian Apache Privilege Escalation
Vendor Patch. Secunia Advisory 95 of 111 in 2007. 12,547 views.
Release Date:
2007-02-27
Secunia Advisory ID:
SA24324
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been discovered in Debian, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for postgresql
Vendor Patch. Secunia Advisory 96 of 111 in 2007. 8,422 views.
Release Date:
2007-02-16
Secunia Advisory ID:
SA24158
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Debian has issued an update for postgresql. This fixes a vulnerability, which can be exploited by malicious users to gain knowledge of potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Debian update for imagemagick
Vendor Patch. Secunia Advisory 97 of 111 in 2007. 7,943 views.
Release Date:
2007-02-15
Secunia Advisory ID:
SA24167
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for imagemagick. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Debian update for fetchmail
Vendor Patch. Secunia Advisory 98 of 111 in 2007. 7,752 views.
Release Date:
2007-02-15
Secunia Advisory ID:
SA24174
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
Debian has issued an update for fetchmail. This fixes a security issue, which can be exploited by malicious people to gain sensitive information. [Read More]


Debian update for mozilla-thunderbird
Vendor Patch. Secunia Advisory 99 of 111 in 2007. 10,318 views.
Release Date:
2007-02-07
Secunia Advisory ID:
SA24078
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a user's system. [Read More]


Debian update for samba
Vendor Patch. Secunia Advisory 100 of 111 in 2007. 10,335 views.
Release Date:
2007-02-06
Secunia Advisory ID:
SA24060
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Debian update for mozilla-firefox
Vendor Patch. Secunia Advisory 101 of 111 in 2007. 11,893 views.
Release Date:
2007-02-02
Secunia Advisory ID:
SA23988
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Exposure of sensitive information
DoS
System access
Where:
From remote
Short Description:
Debian has issued an update for mozilla-firefox. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of certain information, conduct cross-site scripting attacks, and potentially compromise a user's system. [Read More]


Debian update for gtk+2.0
Vendor Patch. Secunia Advisory 102 of 111 in 2007. 8,152 views.
Release Date:
2007-02-01
Secunia Advisory ID:
SA24006
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for gtk+2.0. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libgtop2
Vendor Patch. Secunia Advisory 103 of 111 in 2007. 8,362 views.
Release Date:
2007-02-01
Secunia Advisory ID:
SA24015
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for libgtop2. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for vlc
Vendor Patch. Secunia Advisory 104 of 111 in 2007. 7,015 views.
Release Date:
2007-01-29
Secunia Advisory ID:
SA23971
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. [Read More]


Debian update for bind9
Vendor Patch. Secunia Advisory 105 of 111 in 2007. 6,990 views.
Release Date:
2007-01-29
Secunia Advisory ID:
SA23944
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for cacti
Vendor Patch. Secunia Advisory 106 of 111 in 2007. 8,226 views.
Release Date:
2007-01-26
Secunia Advisory ID:
SA23941
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
System access
Where:
From remote
Short Description:
Debian has issued an update for cacti. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, manipulate data and compromise vulnerable systems. [Read More]


Debian update for netrik
Vendor Patch. Secunia Advisory 107 of 111 in 2007. 6,811 views.
Release Date:
2007-01-22
Secunia Advisory ID:
SA23822
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for netrik. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Debian update for xfree86
Vendor Patch. Secunia Advisory 108 of 111 in 2007. 6,256 views.
Release Date:
2007-01-16
Secunia Advisory ID:
SA23789
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Debian has issued an update for xfree86. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Debian update for libsoup
Vendor Patch. Secunia Advisory 109 of 111 in 2007. 7,954 views.
Release Date:
2007-01-15
Secunia Advisory ID:
SA23770
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libsoup. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for libapache-mod-auth-kerb
Vendor Patch. Secunia Advisory 110 of 111 in 2007. 7,729 views.
Release Date:
2007-01-09
Secunia Advisory ID:
SA23681
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Debian has issued an update for libapache-mod-auth-kerb. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Debian update for openoffice.org
Vendor Patch. Secunia Advisory 111 of 111 in 2007. 9,074 views.
Release Date:
2007-01-09
Secunia Advisory ID:
SA23683
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Debian has issued an update for openoffice.org. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Debian GNU/Linux 3.1 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability