Vulnerabilities (CVE)

Filtered by vendor Debian Subscribe
Filtered by product Debian Linux
Total 9187 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-9481 2 Apache, Debian 2 Traffic Server, Debian Linux 2020-08-18 5.0 MEDIUM 7.5 HIGH
Apache ATS 6.0.0 to 6.2.3, 7.0.0 to 7.1.9, and 8.0.0 to 8.0.6 is vulnerable to a HTTP/2 slow read attack.
CVE-2012-0842 2 Debian, Suckless 2 Debian Linux, Surf 2020-08-18 2.1 LOW 5.5 MEDIUM
surf: cookie jar has read access from other local user
CVE-2019-2977 3 Debian, Netapp, Oracle 10 Debian Linux, Active Iq Unified Manager, E-series Santricity Os Controller and 7 more 2020-08-18 5.8 MEDIUM 4.8 MEDIUM
Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.8 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L).
CVE-2012-2350 2 Debian, Pam Shield Project 2 Debian Linux, Pam Shield 2020-08-18 5.0 MEDIUM 7.5 HIGH
pam_shield before 0.9.4: Default configuration does not perform protective action
CVE-2009-3614 2 Debian, Noping 2 Debian Linux, Liboping 2020-08-18 2.1 LOW 3.3 LOW
liboping 1.3.2 allows users reading arbitrary files upon the local system.
CVE-2011-1489 3 Debian, Opensuse, Rsyslog 3 Debian Linux, Opensuse, Rsyslog 2020-08-18 2.1 LOW 5.5 MEDIUM
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages were logged when multiple rulesets were used and some output batches contained messages belonging to more than one ruleset. A local attacker could cause denial of the rsyslogd daemon service via a log message belonging to more than one ruleset.
CVE-2011-2515 3 Debian, Packagekit Project, Redhat 3 Debian Linux, Packagekit, Enterprise Linux Server 2020-08-18 4.6 MEDIUM 5.3 MEDIUM
PackageKit 0.6.17 allows installation of unsigned RPM packages as though they were signed which may allow installation of non-trusted packages and execution of arbitrary code.
CVE-2020-11025 2 Debian, Wordpress 2 Debian Linux, Wordpress 2020-08-18 3.5 LOW 5.4 MEDIUM
In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
CVE-2012-0812 2 Debian, Postfix Admin Project 2 Debian Linux, Postfix Admin 2020-08-18 4.3 MEDIUM 6.1 MEDIUM
PostfixAdmin 2.3.4 has multiple XSS vulnerabilities
CVE-2007-6745 2 Clamav, Debian 2 Clamav, Debian Linux 2020-08-18 7.5 HIGH 9.8 CRITICAL
clamav 0.91.2 suffers from a floating point exception when using ScanOLE2.
CVE-2014-5255 2 Debian, Xcfa Project 2 Debian Linux, Xcfa 2020-08-18 4.4 MEDIUM 7.0 HIGH
xcfa before 5.0.1 creates temporary files insecurely which could allow local users to launch a symlink attack and overwrite arbitrary files. Note: A different vulnerability than CVE-2014-5254.
CVE-2019-14777 2 Debian, Videolan 2 Debian Linux, Vlc Media Player 2020-08-18 6.8 MEDIUM 7.8 HIGH
The Control function of demux/mkv/mkv.cpp in VideoLAN VLC media player 3.0.7.1 has a use-after-free.
CVE-2014-1936 2 Debian, Rc Project 2 Debian Linux, Rc 2020-08-18 5.0 MEDIUM 7.5 HIGH
rc before 1.7.1-5 insecurely creates temporary files.
CVE-2013-2745 2 Debian, Minidlna Project 2 Debian Linux, Minidlna 2020-08-18 7.5 HIGH 9.8 CRITICAL
An SQL Injection vulnerability exists in MiniDLNA prior to 1.1.0
CVE-2014-0021 3 Chrony Project, Debian, Fedoraproject 3 Chrony, Debian Linux, Fedora 2020-08-18 5.0 MEDIUM 7.5 HIGH
Chrony before 1.29.1 has traffic amplification in cmdmon protocol
CVE-2011-3596 2 Debian, Polipo Project 2 Debian Linux, Polipo 2020-08-18 5.0 MEDIUM 7.5 HIGH
Polipo before 1.0.4.1 suffers from a DoD vulnerability via specially-crafted HTTP POST / PUT request.
CVE-2020-11729 2 Davical, Debian 2 Andrew\'s Web Libraries, Debian Linux 2020-08-18 7.5 HIGH 9.8 CRITICAL
An issue was discovered in DAViCal Andrew's Web Libraries (AWL) through 0.60. Long-term session cookies, uses to provide long-term session continuity, are not generated securely, enabling a brute-force attack that may be successful.
CVE-2014-5439 2 Debian, Sniffit Project 2 Debian Linux, Sniffit 2020-08-18 9.3 HIGH 7.8 HIGH
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
CVE-2016-1000108 2 Debian, Yaws 2 Debian Linux, Yaws 2020-08-18 5.8 MEDIUM 6.1 MEDIUM
yaws before 2.0.4 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
CVE-2011-3631 3 Debian, Hardlink Project, Redhat 3 Debian Linux, Hardlink, Enterprise Linux 2020-08-18 6.8 MEDIUM 8.8 HIGH
Hardlink before 0.1.2 has multiple integer overflows leading to heap-based buffer overflows because of the way string lengths concatenation is done in the calculation of the required memory space to be used. A remote attacker could provide a specially-crafted directory tree and trick the local user into consolidating it, leading to hardlink executable crash or potentially arbitrary code execution with user privileges.