The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Etch

Ikiwiki: information disclosure via Server-Side Request Forgery
An attacker can bypass access restrictions to data via Server-Side Request Forgery of Ikiwiki, in order to obtain sensitive information...
CVE-2019-9187, DLA-1716-1, DSA-4399-1, VIGILANCE-VUL-28629
file: out-of-bounds memory reading via do_core_note
An attacker can force a read at an invalid address via do_core_note() of file, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2019-8905, DLA-1698-1, DLA-1698-2, FEDORA-2019-15f5147b27, openSUSE-SU-2019:0345-1, openSUSE-SU-2019:1197-1, SUSE-SU-2019:0571-1, SUSE-SU-2019:0839-1, USN-3911-1, USN-3911-2, VIGILANCE-VUL-28627
Wireshark: three vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
bulletinapr2019, CERTFR-2019-AVI-081, CVE-2019-9208, CVE-2019-9209, CVE-2019-9214, DLA-1729-1, DSA-4416-1, openSUSE-SU-2019:1108-1, openSUSE-SU-2019:1390-1, openSUSE-SU-2020:0362-1, SUSE-SU-2019:0619-1, SUSE-SU-2019:0688-1, USN-3986-1, VIGILANCE-VUL-28619, wnpa-sec-2019-06, wnpa-sec-2019-07, wnpa-sec-2019-08
GPAC: multiple vulnerabilities
An attacker can use several vulnerabilities of GPAC...
CVE-2018-20760, CVE-2018-20761, CVE-2018-20762, CVE-2018-20763, DLA-1693-1, USN-3926-1, VIGILANCE-VUL-28618
GPAC: buffer overflow via gf_media_avc_read_sps
An attacker can trigger a buffer overflow via gf_media_avc_read_sps() of GPAC, in order to trigger a denial of service, and possibly to run code...
CVE-2018-7752, DLA-1693-1, USN-3926-1, VIGILANCE-VUL-28617
Exiv2: denial of service via Exiv2-Internal-TiffParserWorker-findPrimaryGroups
An attacker can trigger a fatal error via Exiv2::Internal::TiffParserWorker::findPrimaryGroups() of Exiv2, in order to trigger a denial of service...
CVE-2018-20097, DLA-1691-1, RHSA-2019:2101-01, RHSA-2020:1577-01, VIGILANCE-VUL-28613
Exiv2: out-of-bounds memory reading via PngChunk-readRawProfile
An attacker can force a read at an invalid address via PngChunk::readRawProfile() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2018-19535, DLA-1691-1, RHSA-2019:2101-01, RHSA-2020:1577-01, USN-4056-1, VIGILANCE-VUL-28612
Exiv2: infinite loop via Exiv2-PsdImage-readMetadata
An attacker can trigger an infinite loop via Exiv2::PsdImage::readMetadata() of Exiv2, in order to trigger a denial of service...
CVE-2018-19108, DLA-1691-1, openSUSE-SU-2020:0482-1, RHSA-2019:2101-01, RHSA-2020:1577-01, USN-4056-1, VIGILANCE-VUL-28611
Exiv2: out-of-bounds memory reading via Exiv2-IptcParser-decode
An attacker can force a read at an invalid address via Exiv2::IptcParser::decode() of Exiv2, in order to trigger a denial of service, or to obtain sensitive information...
CVE-2018-19107, DLA-1691-1, RHSA-2019:2101-01, RHSA-2020:1577-01, USN-4056-1, VIGILANCE-VUL-28610
LDB: denial of service via Search Expressions
An attacker can trigger a fatal error via Search Expressions of LDB, in order to trigger a denial of service...
CVE-2019-3824, DLA-1699-1, DSA-4397-1, openSUSE-SU-2019:1163-1, SUSE-SU-2019:0639-1, USN-3895-1, VIGILANCE-VUL-28602
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Etch: