Product:

Debian_linux

(Debian)
Repositories https://github.com/torvalds/linux
https://github.com/WordPress/WordPress
https://github.com/rdesktop/rdesktop
https://github.com/FFmpeg/FFmpeg
https://github.com/neomutt/neomutt
https://github.com/FasterXML/jackson-databind
https://github.com/ImageMagick/ImageMagick
https://github.com/redmine/redmine
https://github.com/rubygems/rubygems
https://github.com/dbry/WavPack
https://github.com/bcgit/bc-java
https://github.com/krb5/krb5
https://github.com/kyz/libmspack
https://github.com/libgd/libgd
https://github.com/gpac/gpac
https://github.com/mantisbt/mantisbt
https://github.com/newsoft/libvncserver
https://github.com/ceph/ceph
https://github.com/uriparser/uriparser
https://github.com/FreeRDP/FreeRDP
https://github.com/LibRaw/LibRaw
https://github.com/verdammelt/tnef
https://github.com/LibVNC/libvncserver
https://github.com/libgit2/libgit2
https://github.com/mdadams/jasper
https://github.com/openssl/openssl
https://github.com/OTRS/otrs
https://github.com/Perl/perl5
https://github.com/php/php-src
https://github.com/antirez/redis
https://github.com/Yeraze/ytnef
https://github.com/ARMmbed/mbedtls
https://github.com/inspircd/inspircd
https://github.com/python-pillow/Pillow
https://github.com/perl5-dbi/DBD-mysql
https://github.com/libevent/libevent
https://github.com/ntp-project/ntp
https://github.com/curl/curl
https://github.com/dovecot/core
https://github.com/szukw000/openjpeg
https://github.com/memcached/memcached
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/kamailio/kamailio
https://github.com/mm2/Little-CMS
https://github.com/znc/znc
https://github.com/uclouvain/openjpeg
https://github.com/vadz/libtiff
https://github.com/horde/horde
https://github.com/mono/mono
https://github.com/varnishcache/varnish-cache
https://github.com/inverse-inc/sogo
https://github.com/phusion/passenger
https://github.com/openssh/openssh-portable
https://github.com/codehaus-plexus/plexus-archiver
https://github.com/karelzak/util-linux
https://git.kernel.org/pub/scm/git/git.git
https://github.com/apple/cups
https://github.com/shadowsocks/shadowsocks-libev
https://github.com/simplesamlphp/simplesamlphp
https://github.com/GNOME/evince
https://github.com/torproject/tor
https://github.com/beanshell/beanshell
https://github.com/derickr/timelib
https://github.com/libarchive/libarchive
https://github.com/openbsd/src
https://git.savannah.gnu.org/git/patch.git
https://github.com/puppetlabs/puppet
https://github.com/dom4j/dom4j
https://github.com/golang/go
https://github.com/sleuthkit/sleuthkit
https://github.com/zhutougg/c3p0
https://github.com/flori/json
https://github.com/symfony/symfony
https://github.com/akrennmair/newsbeuter
https://github.com/eldy/awstats
https://github.com/libyal/libevt
https://github.com/jcupitt/libvips
https://github.com/paramiko/paramiko
https://github.com/simplesamlphp/saml2
https://github.com/DanBloomberg/leptonica
https://github.com/anymail/django-anymail
https://github.com/mpv-player/mpv
https://github.com/python/cpython
https://github.com/lxml/lxml
https://github.com/git/git
https://github.com/TeX-Live/texlive-source
https://github.com/ImageMagick/ImageMagick6
https://github.com/resiprocate/resiprocate
https://github.com/vim-syntastic/syntastic
https://github.com/gosa-project/gosa-core
https://github.com/Cisco-Talos/clamav-devel
https://github.com/GNOME/librsvg
https://github.com/apache/httpd
https://github.com/weechat/weechat
https://github.com/viewvc/viewvc
https://github.com/moinwiki/moin-1.9
https://github.com/mapserver/mapserver
https://github.com/splitbrain/dokuwiki
https://github.com/heimdal/heimdal
https://github.com/openstack/swauth
https://github.com/bottlepy/bottle
https://github.com/charybdis-ircd/charybdis
https://github.com/westes/flex
https://github.com/mjg59/pupnp-code
https://github.com/collectd/collectd
https://github.com/django/django
https://git.videolan.org/git/vlc.git
https://github.com/atheme/atheme
https://github.com/jpirko/libndp
https://github.com/fragglet/lhasa
https://github.com/neovim/neovim
https://github.com/Quagga/quagga
https://github.com/rohe/pysaml2
https://github.com/mysql/mysql-server
https://github.com/varnish/Varnish-Cache
https://github.com/PHPMailer/PHPMailer
https://github.com/Automattic/Genericons
https://github.com/jmacd/xdelta-devel
https://github.com/file/file
https://github.com/ellson/graphviz
https://github.com/axkibe/lsyncd
https://github.com/quassel/quassel
https://github.com/yarolig/didiwiki
https://github.com/jquery/jquery-ui
#Vulnerabilities 3571
Date ID Summary Products Score Patch
2018-12-21 CVE-2018-20346 Multiple issues in SQLite via WebSQL in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. Debian_linux, Chrome, Leap, Linux, Sqlite 8.1
2018-01-12 CVE-2017-13194 A vulnerability in the Android media framework (libvpx) related to odd frame width. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-64710201. Debian_linux, Android 7.5
2019-11-22 CVE-2015-7810 libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files Debian_linux, Fedora, Enterprise_linux, Libbluray N/A
2019-11-22 CVE-2015-5694 Designate does not enforce the DNS protocol limit concerning record set sizes Debian_linux, Designate, Enterprise_linux_openstack_platform N/A
2019-11-22 CVE-2014-6310 Buffer overflow in CHICKEN 4.9.0 and 4.9.0.1 may allow remote attackers to execute arbitrary code via the 'select' function. Chicken, Debian_linux N/A
2019-11-19 CVE-2014-5439 sniffit 0.3.7 and prior: A configuration file can be leveraged to execute code as root Debian_linux, Sniffit N/A
2019-11-21 CVE-2014-1936 rc before 1.7.1-5 insecurely creates temporary files. Debian_linux, Rc N/A
2019-11-21 CVE-2014-0083 The Ruby net-ldap gem before 0.16.2 uses a weak salt when generating SSHA passwords. Debian_linux, Net\-Ldap N/A
2019-11-13 CVE-2010-4817 pithos before 0.3.5 allows overwrite of arbitrary files via symlinks. Debian_linux, Pithos N/A
2019-10-16 CVE-2019-2977 Vulnerability in the Java SE product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Java SE: 11.0.4 and 13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE. Note: This... Debian_linux, Active_iq_unified_manager, E\-Series_santricity_os_controller, E\-Series_santricity_storage_manager, E\-Series_santricity_unified_manager, E\-Series_santricity_web_services_proxy, Oncommand_workflow_automation, Snapmanager, Jdk, Jre N/A