The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Lenny

xymon: five vulnerabilities
An attacker can use several vulnerabilities of xymon...
CVE-2016-2054, CVE-2016-2055, CVE-2016-2056, CVE-2016-2057, CVE-2016-2058, DLA-488-1, DSA-3495-1, VIGILANCE-VUL-19044
Wireshark 1: seven vulnerabilities
An attacker can use several vulnerabilities of Wireshark 1...
11822, 11825, 12106, bulletinapr2016, bulletinjul2016, CERTFR-2016-AVI-074, CVE-2016-2521, CVE-2016-2523, CVE-2016-2530, CVE-2016-2531, CVE-2016-2532, CVE-2016-4417, CVE-2016-4418, CVE-2016-4421, DSA-3516-1, openSUSE-SU-2016:0660-1, openSUSE-SU-2016:0661-1, VIGILANCE-VUL-19043, wnpa-sec-2016-01, wnpa-sec-2016-03, wnpa-sec-2016-10, wnpa-sec-2016-11, wnpa-sec-2016-14, wnpa-sec-2016-15, wnpa-sec-2016-18
Python Pillow: buffer overflow of PcdDecode.c
An attacker can generate a buffer overflow in PcdDecode.c of Python Pillow, in order to trigger a denial of service, and possibly to run code...
bulletinjan2016, CVE-2016-2533, DSA-3499-1, USN-3080-1, USN-3090-1, USN-3090-2, VIGILANCE-VUL-19039
Apache Xerces-C: buffer overflow
An attacker can generate a buffer overflow of Apache Xerces-C, in order to trigger a denial of service, and possibly to run code...
1610582, 1983969, 1984073, 1987066, 1990410, 2002647, cpuapr2017, cpuoct2018, CVE-2016-0729, DSA-3493-1, FEDORA-2016-0a061f6dd9, FEDORA-2016-7615febbd6, FEDORA-2016-87e8468465, FEDORA-2016-880b91c090, FEDORA-2016-ae9ac16cf3, openSUSE-SU-2016:0966-1, openSUSE-SU-2016:1121-1, RHSA-2016:0430-01, VIGILANCE-VUL-19033
Linux kernel: integer overflow of aio_setup_single_vector
An attacker can generate an integer overflow in the aio_setup_single_vector() function of the Linux kernel, in order to trigger a denial of service, and possibly to run code...
CERTFR-2016-AVI-082, CERTFR-2016-AVI-159, CVE-2012-6701, CVE-2015-8830, DSA-3503-1, K13213573, openSUSE-SU-2016:2144-1, RHSA-2018:1854-01, RHSA-2018:3083-01, RHSA-2018:3096-01, USN-2968-1, USN-2968-2, USN-2969-1, USN-2970-1, VIGILANCE-VUL-19032
Drupal Core: multiple vulnerabilities
An attacker can use several vulnerabilities of Drupal Core...
CERTFR-2016-AVI-072, CVE-2016-3162, CVE-2016-3163, CVE-2016-3164, CVE-2016-3165, CVE-2016-3166, CVE-2016-3167, CVE-2016-3168, CVE-2016-3169, CVE-2016-3170, CVE-2016-3171, DRUPAL-SA-CORE-2016-001, DSA-3498-1, FEDORA-2016-266406ab92, FEDORA-2016-45d4920315, FEDORA-2016-8411497132, VIGILANCE-VUL-19029
websvn: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of websvn, in order to run JavaScript code in the context of the web site...
CVE-2016-2511, DSA-3490-1, FEDORA-2016-11537160e9, FEDORA-2016-657a1305aa, VIGILANCE-VUL-19023
Squid: assertion error via Large HTTP Response
An attacker can use an HTTP reply containing a large header, to force an assertion error in Squid, in order to trigger a denial of service...
CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, DSA-3522-1, openSUSE-SU-2016:2081-1, RHSA-2016:2600-02, SQUID-2016:2, SUSE-SU-2016:1996-1, SUSE-SU-2016:2089-1, USN-2921-1, USN-3557-1, VIGILANCE-VUL-19018
GraphicsMagick: unreachable memory reading via GIF
An attacker can force a read at an invalid address in GIF of GraphicsMagick, in order to trigger a denial of service...
CVE-2015-8808, DLA-484-1, DSA-3746-1, FEDORA-2016-49bf88cd29, SUSE-SU-2016:1614-1, VIGILANCE-VUL-19016
Botan: three vulnerabilities
An attacker can use several vulnerabilities of Botan...
CVE-2016-2194, CVE-2016-2195, CVE-2016-2196, DLA-449-1, DLA-449-2, DSA-3565-1, DSA-3565-2, FEDORA-2016-1c08d77b96, FEDORA-2016-fb9b356b74, VIGILANCE-VUL-19015
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Lenny: