Vulnerabilities (CVE)

Filtered by vendor Debian Subscribe
Total 8991 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2015-7810 4 Debian, Fedoraproject, Redhat and 1 more 4 Debian Linux, Fedora, Enterprise Linux and 1 more 2020-08-18 3.3 LOW 4.7 MEDIUM
libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files
CVE-2011-3632 3 Debian, Hardlink Project, Redhat 3 Debian Linux, Hardlink, Enterprise Linux 2020-08-18 3.6 LOW 7.1 HIGH
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks.
CVE-2009-3614 2 Debian, Noping 2 Debian Linux, Liboping 2020-08-18 2.1 LOW 3.3 LOW
liboping 1.3.2 allows users reading arbitrary files upon the local system.
CVE-2010-4532 2 Debian, Offlineimap 2 Debian Linux, Offlineimap 2020-08-18 4.3 MEDIUM 5.9 MEDIUM
offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks.
CVE-2012-1572 2 Debian, Openstack 2 Debian Linux, Keystone 2020-08-18 5.0 MEDIUM 7.5 HIGH
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space
CVE-2008-7291 2 Debian, Gri Project 2 Debian Linux, Gri 2020-08-18 7.5 HIGH 9.8 CRITICAL
gri before 2.12.18 generates temporary files in an insecure way.
CVE-2017-14604 2 Debian, Gnome 2 Debian Linux, Nautilus 2020-08-18 4.0 MEDIUM 6.5 MEDIUM
GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field.
CVE-2020-11030 2 Debian, Wordpress 2 Debian Linux, Wordpress 2020-08-18 3.5 LOW 5.4 MEDIUM
In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).
CVE-2014-1936 2 Debian, Rc Project 2 Debian Linux, Rc 2020-08-18 5.0 MEDIUM 7.5 HIGH
rc before 1.7.1-5 insecurely creates temporary files.
CVE-2015-5694 3 Debian, Openstack, Redhat 3 Debian Linux, Designate, Enterprise Linux Openstack Platform 2020-08-18 4.0 MEDIUM 6.5 MEDIUM
Designate does not enforce the DNS protocol limit concerning record set sizes
CVE-2011-1934 2 Debian, Lilo Project 2 Debian Linux, Lilo 2020-08-18 4.0 MEDIUM 4.3 MEDIUM
lilo-uuid-diskid causes lilo.conf to be world-readable in lilo 23.1.
CVE-2012-5521 3 Debian, Quagga, Redhat 3 Debian Linux, Quagga, Enterprise Linux 2020-08-18 3.3 LOW 6.5 MEDIUM
quagga (ospf6d) 0.99.21 has a DoS flaw in the way the ospf6d daemon performs routes removal
CVE-2012-0842 2 Debian, Suckless 2 Debian Linux, Surf 2020-08-18 2.1 LOW 5.5 MEDIUM
surf: cookie jar has read access from other local user
CVE-2011-1136 2 Debian, Tesseract Project 2 Debian Linux, Tesseract 2020-08-18 6.3 MEDIUM 4.7 MEDIUM
In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file.
CVE-2014-0021 3 Chrony Project, Debian, Fedoraproject 3 Chrony, Debian Linux, Fedora 2020-08-18 5.0 MEDIUM 7.5 HIGH
Chrony before 1.29.1 has traffic amplification in cmdmon protocol
CVE-2012-2350 2 Debian, Pam Shield Project 2 Debian Linux, Pam Shield 2020-08-18 5.0 MEDIUM 7.5 HIGH
pam_shield before 0.9.4: Default configuration does not perform protective action
CVE-2010-3359 2 Debian, Gargoyle Project 2 Debian Linux, Gargoyle 2020-08-18 4.4 MEDIUM 4.8 MEDIUM
If LD_LIBRARY_PATH is undefined in gargoyle-free before 2009-08-25, the variable will point to the current directory. This can allow a local user to trick another user into running gargoyle in a directory with a cracked libgarglk.so and gain access to the user's account.
CVE-2011-1028 2 Debian, Smarty 2 Debian Linux, Smarty 2020-08-18 7.5 HIGH 9.8 CRITICAL
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
CVE-2011-3618 2 Atop Project, Debian 2 Atop, Debian Linux 2020-08-18 4.6 MEDIUM 7.8 HIGH
atop: symlink attack possible due to insecure tempfile handling
CVE-2013-6275 2 Debian, Horde 2 Debian Linux, Groupware 2020-08-18 4.3 MEDIUM 6.5 MEDIUM
Multiple CSRF issues in Horde Groupware Webmail Edition 5.1.2 and earlier in basic.php.