The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Debian Jessie

2 wget: information disclosure via Header Injection
An attacker can bypass access restrictions to data via Header Injection of wget, in order to obtain sensitive information...
CVE-2017-6508, DLA-851-1, FEDORA-2017-22f1a8404e, FEDORA-2017-38c3781b89, FEDORA-2017-ed1c665a3f, openSUSE-SU-2017:0890-1, USN-3464-1, USN-3464-2, VIGILANCE-VUL-22055
2 Linux kernel: privilege escalation via n_hdlc.c
A local attacker can use a race in n_hdlc.c on the Linux kernel, in order to escalate his privileges...
CERTFR-2017-AVI-070, CERTFR-2017-AVI-282, CVE-2017-2636, DLA-849-1, DSA-3804-1, K18015201, openSUSE-SU-2017:0906-1, openSUSE-SU-2017:0907-1, RHSA-2017:0892-01, RHSA-2017:0931-01, RHSA-2017:0933-01, RHSA-2017:0986-01, RHSA-2017:1125-01, RHSA-2017:1126-01, RHSA-2017:1232-01, RHSA-2017:1233-01, SUSE-SU-2017:0864-1, SUSE-SU-2017:0865-1, SUSE-SU-2017:0866-1, SUSE-SU-2017:0912-1, SUSE-SU-2017:0913-1, SUSE-SU-2017:1990-1, SUSE-SU-2017:2342-1, USN-3218-1, USN-3219-1, USN-3219-2, USN-3220-1, USN-3220-2, USN-3220-3, USN-3221-1, USN-3221-2, VIGILANCE-VUL-22037
2 TeX: code execution via mpost
An attacker can use a vulnerability via mpost of TeX, in order to run code...
CVE-2016-10243, DLA-847-1, DSA-3803-1, FEDORA-2017-b72cafa5b4, USN-3401-1, VIGILANCE-VUL-22036
2 FreeType: denial of service via parse_charstrings
An attacker can generate a fatal error via parse_charstrings() of FreeType, in order to trigger a denial of service...
CVE-2016-10244, DLA-848-1, DSA-3839-1, FEDORA-2017-3886afeb06, FEDORA-2017-c09c0cc384, openSUSE-SU-2018:0420-1, SUSE-SU-2018:0414-1, USN-3237-1, VIGILANCE-VUL-22032
2 WordPress: six vulnerabilities
An attacker can use several vulnerabilities of WordPress...
CERTFR-2017-AVI-067, CVE-2017-6814, CVE-2017-6815, CVE-2017-6816, CVE-2017-6817, CVE-2017-6818, CVE-2017-6819, DLA-860-1, DSA-3815-1, VIGILANCE-VUL-22025
2 QEMU: infinite loop via ohci_service_ed_list
An attacker can generate an infinite loop via ohci_service_ed_list() of QEMU, in order to trigger a denial of service...
CVE-2017-6505, DLA-1070-1, DLA-1071-1, DLA-1497-1, FEDORA-2017-31b976672b, FEDORA-2017-3d16d348eb, FEDORA-2017-62ac1230f7, openSUSE-SU-2017:1078-1, openSUSE-SU-2017:1872-1, SUSE-SU-2017:0983-1, SUSE-SU-2017:1058-1, SUSE-SU-2017:1080-1, SUSE-SU-2017:1081-1, SUSE-SU-2017:1147-1, SUSE-SU-2017:1774-1, SUSE-SU-2017:2946-1, SUSE-SU-2017:2963-1, SUSE-SU-2017:2969-1, SUSE-SU-2017:3084-1, USN-3261-1, USN-3268-1, VIGILANCE-VUL-22024
1 Wireshark: nine vulnerabilities
An attacker can use several vulnerabilities of Wireshark...
bulletinapr2017, CERTFR-2017-AVI-065, CVE-2017-6467, CVE-2017-6468, CVE-2017-6469, CVE-2017-6470, CVE-2017-6471, CVE-2017-6472, CVE-2017-6473, CVE-2017-6474, DLA-858-1, DSA-3811-1, FEDORA-2017-6c91c98b33, openSUSE-SU-2017:0664-1, VIGILANCE-VUL-22019, wnpa-sec-2017-03, wnpa-sec-2017-04, wnpa-sec-2017-05, wnpa-sec-2017-06, wnpa-sec-2017-07, wnpa-sec-2017-08, wnpa-sec-2017-09, wnpa-sec-2017-10, wnpa-sec-2017-11
2 KDE Kio: information disclosure via PAC File
An attacker can bypass access restrictions to data via PAC File of KDE Kio, in order to obtain sensitive information...
CVE-2017-6410, DLA-952-1, DSA-3849-1, FEDORA-2017-01eed6fe8c, FEDORA-2017-4f4eef4791, FEDORA-2017-53338ece0c, FEDORA-2017-b011e8c922, FEDORA-2017-f9ab92fa6c, openSUSE-SU-2017:0677-1, openSUSE-SU-2017:0680-1, USN-3223-1, VIGILANCE-VUL-22016
2 ruby-zip: directory traversal
An attacker can traverse directories of ruby-zip, in order to create a file outside the service root path...
CVE-2017-5946, DLA-846-1, DSA-3801-1, openSUSE-SU-2017:2120-1, VIGILANCE-VUL-22015
2 VIM: two vulnerabilities
An attacker can use several vulnerabilities of VIM...
CVE-2017-6349, CVE-2017-6350, DLA-850-1, FEDORA-2017-8494d0142c, FEDORA-2017-e9171a0c00, openSUSE-SU-2017:1811-1, VIGILANCE-VUL-22003
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Jessie: