Filtered by vendor Debian
Subscribe
Total
8991 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2015-7810 | 4 Debian, Fedoraproject, Redhat and 1 more | 4 Debian Linux, Fedora, Enterprise Linux and 1 more | 2020-08-18 | 3.3 LOW | 4.7 MEDIUM |
libbluray MountManager class has a time-of-check time-of-use (TOCTOU) race when expanding JAR files | |||||
CVE-2011-3632 | 3 Debian, Hardlink Project, Redhat | 3 Debian Linux, Hardlink, Enterprise Linux | 2020-08-18 | 3.6 LOW | 7.1 HIGH |
Hardlink before 0.1.2 operates on full file system objects path names which can allow a local attacker to use this flaw to conduct symlink attacks. | |||||
CVE-2009-3614 | 2 Debian, Noping | 2 Debian Linux, Liboping | 2020-08-18 | 2.1 LOW | 3.3 LOW |
liboping 1.3.2 allows users reading arbitrary files upon the local system. | |||||
CVE-2010-4532 | 2 Debian, Offlineimap | 2 Debian Linux, Offlineimap | 2020-08-18 | 4.3 MEDIUM | 5.9 MEDIUM |
offlineimap before 6.3.2 does not check for SSL server certificate validation when "ssl = yes" option is specified which can allow man-in-the-middle attacks. | |||||
CVE-2012-1572 | 2 Debian, Openstack | 2 Debian Linux, Keystone | 2020-08-18 | 5.0 MEDIUM | 7.5 HIGH |
OpenStack Keystone: extremely long passwords can crash Keystone by exhausting stack space | |||||
CVE-2008-7291 | 2 Debian, Gri Project | 2 Debian Linux, Gri | 2020-08-18 | 7.5 HIGH | 9.8 CRITICAL |
gri before 2.12.18 generates temporary files in an insecure way. | |||||
CVE-2017-14604 | 2 Debian, Gnome | 2 Debian Linux, Nautilus | 2020-08-18 | 4.0 MEDIUM | 6.5 MEDIUM |
GNOME Nautilus before 3.23.90 allows attackers to spoof a file type by using the .desktop file extension, as demonstrated by an attack in which a .desktop file's Name field ends in .pdf but this file's Exec field launches a malicious "sh -c" command. In other words, Nautilus provides no UI indication that a file actually has the potentially unsafe .desktop extension; instead, the UI only shows the .pdf extension. One (slightly) mitigating factor is that an attack requires the .desktop file to have execute permission. The solution is to ask the user to confirm that the file is supposed to be treated as a .desktop file, and then remember the user's answer in the metadata::trusted field. | |||||
CVE-2020-11030 | 2 Debian, Wordpress | 2 Debian Linux, Wordpress | 2020-08-18 | 3.5 LOW | 5.4 MEDIUM |
In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). | |||||
CVE-2014-1936 | 2 Debian, Rc Project | 2 Debian Linux, Rc | 2020-08-18 | 5.0 MEDIUM | 7.5 HIGH |
rc before 1.7.1-5 insecurely creates temporary files. | |||||
CVE-2015-5694 | 3 Debian, Openstack, Redhat | 3 Debian Linux, Designate, Enterprise Linux Openstack Platform | 2020-08-18 | 4.0 MEDIUM | 6.5 MEDIUM |
Designate does not enforce the DNS protocol limit concerning record set sizes | |||||
CVE-2011-1934 | 2 Debian, Lilo Project | 2 Debian Linux, Lilo | 2020-08-18 | 4.0 MEDIUM | 4.3 MEDIUM |
lilo-uuid-diskid causes lilo.conf to be world-readable in lilo 23.1. | |||||
CVE-2012-5521 | 3 Debian, Quagga, Redhat | 3 Debian Linux, Quagga, Enterprise Linux | 2020-08-18 | 3.3 LOW | 6.5 MEDIUM |
quagga (ospf6d) 0.99.21 has a DoS flaw in the way the ospf6d daemon performs routes removal | |||||
CVE-2012-0842 | 2 Debian, Suckless | 2 Debian Linux, Surf | 2020-08-18 | 2.1 LOW | 5.5 MEDIUM |
surf: cookie jar has read access from other local user | |||||
CVE-2011-1136 | 2 Debian, Tesseract Project | 2 Debian Linux, Tesseract | 2020-08-18 | 6.3 MEDIUM | 4.7 MEDIUM |
In tesseract 2.03 and 2.04, an attacker can rewrite an arbitrary user file by guessing the PID and creating a link to the user's file. | |||||
CVE-2014-0021 | 3 Chrony Project, Debian, Fedoraproject | 3 Chrony, Debian Linux, Fedora | 2020-08-18 | 5.0 MEDIUM | 7.5 HIGH |
Chrony before 1.29.1 has traffic amplification in cmdmon protocol | |||||
CVE-2012-2350 | 2 Debian, Pam Shield Project | 2 Debian Linux, Pam Shield | 2020-08-18 | 5.0 MEDIUM | 7.5 HIGH |
pam_shield before 0.9.4: Default configuration does not perform protective action | |||||
CVE-2010-3359 | 2 Debian, Gargoyle Project | 2 Debian Linux, Gargoyle | 2020-08-18 | 4.4 MEDIUM | 4.8 MEDIUM |
If LD_LIBRARY_PATH is undefined in gargoyle-free before 2009-08-25, the variable will point to the current directory. This can allow a local user to trick another user into running gargoyle in a directory with a cracked libgarglk.so and gain access to the user's account. | |||||
CVE-2011-1028 | 2 Debian, Smarty | 2 Debian Linux, Smarty | 2020-08-18 | 7.5 HIGH | 9.8 CRITICAL |
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file. | |||||
CVE-2011-3618 | 2 Atop Project, Debian | 2 Atop, Debian Linux | 2020-08-18 | 4.6 MEDIUM | 7.8 HIGH |
atop: symlink attack possible due to insecure tempfile handling | |||||
CVE-2013-6275 | 2 Debian, Horde | 2 Debian Linux, Groupware | 2020-08-18 | 4.3 MEDIUM | 6.5 MEDIUM |
Multiple CSRF issues in Horde Groupware Webmail Edition 5.1.2 and earlier in basic.php. |