Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Debian_linux
(Debian)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-11-15 | CVE-2016-5285 | A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service. | Aura_application_enablement_services, Aura_application_server_5300, Aura_communication_manager, Aura_communication_manager_messagint, Aura_conferencing, Aura_experience_portal, Aura_messaging, Aura_session_manager, Aura_system_manager, Aura_system_platform_firmware, Aura_utility_services, Breeze_platform, Call_management_system, Cs1000e\/cs1000m_signaling_server_firmware, Cs1000e_firmware, Cs1000m_firmware, Ip_office, Iq, Meeting_exchange, Message_networking, One\-X_client_enablement_services, Proactive_contact, Session_border_controller_for_enterprise_firmware, Debian_linux, Nss, Enterprise_linux, Linux_enterprise_server | N/A | ||
2019-12-20 | CVE-2015-8313 | GnuTLS incorrectly validates the first byte of padding in CBC modes | Debian_linux, Gnutls | N/A | ||
2020-01-02 | CVE-2014-8182 | An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses. | Debian_linux, Openldap | N/A | ||
2019-12-30 | CVE-2012-5476 | Within the RHOS Essex Preview (2012.2) of the OpenStack dashboard package, the file /etc/quantum/quantum.conf is world readable which exposes the admin password and token value. | Debian_linux, Horizon | N/A | ||
2017-09-12 | CVE-2017-14314 | Off-by-one error in the DrawImage function in magick/render.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (DrawDashPolygon heap-based buffer over-read and application crash) via a crafted file. | Debian_linux, Graphicsmagick | 6.5 | ||
2016-03-09 | CVE-2016-2774 | ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions. | Ubuntu_linux, Debian_linux, Dhcp | N/A | ||
2012-09-14 | CVE-2012-3955 | ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced. | Ubuntu_linux, Debian_linux, Dhcp | N/A | ||
2011-08-15 | CVE-2011-2748 | The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet. | Ubuntu_linux, Debian_linux, Dhcp | N/A | ||
2019-12-26 | CVE-2012-2736 | In NetworkManager 0.9.2.0, when a new wireless network was created with WPA/WPA2 security in AdHoc mode, it created an open/insecure network. | Ubuntu_linux, Debian_linux, Networkmanager, Opensuse | N/A | ||
2019-12-20 | CVE-2012-3409 | ecryptfs-utils: suid helper does not restrict mounting filesystems with nosuid,nodev which creates a possible privilege escalation | Debian_linux, Ecryptfs\-Utils | N/A |