The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Linux

Tornado: information disclosure via BREACH
An attacker can use the BREACH attack on Tornado, in order to obtain a cookie to perform operations on the service...
CVE-2014-9720, DLA-475-1, FEDORA-2015-8606, FEDORA-2015-9143, openSUSE-SU-2015:1998-1, VIGILANCE-VUL-18314
libpng: three vulnerabilities
An attacker can use several vulnerabilities of libpng...
1975365, 1976200, 1976262, 1977405, bulletinjul2016, CERTFR-2015-AVI-488, CVE-2015-8126, DSA-3399-1, FEDORA-2015-13668fff74, FEDORA-2015-1d87313b7c, FEDORA-2015-233750b6ab, FEDORA-2015-39499d9af8, FEDORA-2015-4ad4998d00, FEDORA-2015-501493d853, FEDORA-2015-5e52306c9c, FEDORA-2015-8a1243db75, FEDORA-2015-97fc1797fa, FEDORA-2015-ac8100927a, FEDORA-2015-c80ec85542, FEDORA-2015-ec2ddd15d7, FEDORA-2016-43735c33a7, FEDORA-2016-9a1c707b10, openSUSE-SU-2015:2099-1, openSUSE-SU-2015:2100-1, openSUSE-SU-2015:2135-1, openSUSE-SU-2015:2136-1, openSUSE-SU-2016:0103-1, openSUSE-SU-2016:0104-1, openSUSE-SU-2016:0105-1, openSUSE-SU-2016:0263-1, openSUSE-SU-2016:0268-1, openSUSE-SU-2016:0270-1, openSUSE-SU-2016:0272-1, openSUSE-SU-2016:0279-1, RHSA-2015:2594-01, RHSA-2015:2595-01, RHSA-2015:2596-01, SB10148, SOL76930736, SSA:2015-337-01, SUSE-SU-2016:0256-1, SUSE-SU-2016:0265-1, SUSE-SU-2016:0269-1, SUSE-SU-2016:0390-1, SUSE-SU-2016:0399-1, SUSE-SU-2016:0401-1, SUSE-SU-2016:0428-1, SUSE-SU-2016:0431-1, SUSE-SU-2016:0433-1, SUSE-SU-2016:0636-1, SUSE-SU-2016:0770-1, SUSE-SU-2016:0776-1, USN-2815-1, VIGILANCE-VUL-18301
Google Chrome: information disclosure via PDF Viewer
An attacker can use a vulnerability in the PDF Viewer of Google Chrome, in order to obtain sensitive information...
CERTFR-2015-AVI-482, CVE-2015-1302, DSA-3415-1, openSUSE-SU-2015:2068-1, openSUSE-SU-2015:2069-1, VIGILANCE-VUL-18295
Apache Commons Collections: code execution via InvokerTransformer
An attacker can send a malicious serialized Gadget Chain object to a Java application using Apache Commons Collections, in order to run shell code...
1119363, 1610582, 1970575, 1971370, 1971531, 1971533, 1971751, 1972261, 1972373, 1972565, 1972794, 1972839, 2011281, 7014463, 7022958, 9010052, BSA-2016-004, bulletinjul2016, c04953244, c05050545, c05206507, c05325823, c05327447, CERTFR-2015-AVI-484, CERTFR-2015-AVI-555, cisco-sa-20151209-java-deserialization, COLLECTIONS-580, cpuapr2017, cpuapr2018, cpujan2017, cpujan2018, cpujul2017, cpuoct2016, cpuoct2017, cpuoct2018, CVE-2015-4852, CVE-2015-6420, CVE-2015-6934, CVE-2015-7420-ERROR, CVE-2015-7450, CVE-2015-7501, CVE-2015-8545, CVE-2015-8765, CVE-2016-1985, CVE-2016-1997, CVE-2016-4373, CVE-2016-4398, DSA-3403-1, HPSBGN03542, HPSBGN03560, HPSBGN03630, HPSBGN03656, HPSBGN03670, JSA10838, NTAP-20151123-0001, RHSA-2015:2500-01, RHSA-2015:2501-01, RHSA-2015:2502-01, RHSA-2015:2516-01, RHSA-2015:2517-01, RHSA-2015:2521-01, RHSA-2015:2522-01, RHSA-2015:2523-01, RHSA-2015:2524-01, RHSA-2015:2534-01, RHSA-2015:2535-01, RHSA-2015:2536-01, RHSA-2015:2537-01, RHSA-2015:2538-01, RHSA-2015:2539-01, RHSA-2015:2540-01, RHSA-2015:2541-01, RHSA-2015:2542-01, RHSA-2015:2547-01, RHSA-2015:2548-01, RHSA-2015:2556-01, RHSA-2015:2557-01, RHSA-2015:2559-01, RHSA-2015:2560-01, RHSA-2015:2578-01, RHSA-2015:2579-01, RHSA-2015:2670-01, RHSA-2015:2671-01, RHSA-2016:0040-01, RHSA-2016:0118-01, RHSA-2020:4274-01, SA110, SB10144, SOL30518307, VIGILANCE-VUL-18294, VMSA-2015-0009, VMSA-2015-0009.1, VMSA-2015-0009.2, VMSA-2015-0009.3, VMSA-2015-0009.4, VU#576313
wpasupplicant: denial of service via WPS P2P NFC NDEF
An attacker can send a malicious WPS P2P NFC NDEF packet to wpasupplicant, in order to trigger a denial of service...
CVE-2015-8041, DSA-3397-1, openSUSE-SU-2016:2357-1, openSUSE-SU-2020:2053-1, openSUSE-SU-2020:2059-1, SUSE-SU-2020:3380-1, SUSE-SU-2020:3424-1, VIGILANCE-VUL-18291
wpasupplicant: five vulnerabilities
An attacker can use several vulnerabilities of wpasupplicant...
CVE-2015-4141, CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146, DSA-3397-1, openSUSE-SU-2016:2357-1, openSUSE-SU-2017:2896-1, openSUSE-SU-2020:2053-1, openSUSE-SU-2020:2059-1, SUSE-SU-2020:3380-1, VIGILANCE-VUL-18290
wpasupplicant: four vulnerabilities
An attacker can use several vulnerabilities of wpasupplicant...
CVE-2015-5310, CVE-2015-5314, CVE-2015-5315, CVE-2015-5316, DSA-3397-1, openSUSE-SU-2016:2357-1, openSUSE-SU-2017:2896-1, USN-2808-1, VIGILANCE-VUL-18289
Xen, Linux KVM: infinite loop of x86 Debug Exception
An attacker, who is administrator in a guest system, can generate an infinite loop with a Debug Exception on Xen, in order to trigger a denial of service on the host system...
CERTFR-2015-AVI-466, CERTFR-2015-AVI-508, CERTFR-2015-AVI-549, CERTFR-2015-AVI-554, CERTFR-2015-AVI-556, CERTFR-2015-AVI-563, CERTFR-2016-AVI-050, CERTFR-2017-AVI-012, CTX202583, CTX203879, CVE-2015-8104, DLA-479-1, DSA-3414-1, DSA-3426-1, DSA-3426-2, DSA-3454-1, FEDORA-2015-115c302856, FEDORA-2015-394835a3f6, FEDORA-2015-668d213dc3, FEDORA-2015-cd94ad8d7c, FEDORA-2015-f150b2a8c8, FEDORA-2015-f2c534bc12, JSA10770, JSA10853, K31026324, openSUSE-SU-2015:2232-1, openSUSE-SU-2015:2249-1, openSUSE-SU-2015:2250-1, openSUSE-SU-2016:0124-1, openSUSE-SU-2016:0301-1, openSUSE-SU-2016:0318-1, openSUSE-SU-2016:1008-1, openSUSE-SU-2016:2649-1, RHSA-2015:2552-01, RHSA-2015:2636-01, RHSA-2015:2645-01, RHSA-2016:0004-01, RHSA-2016:0024-01, RHSA-2016:0046-01, RHSA-2016:0103-01, SOL31026324, SUSE-SU-2015:2108-1, SUSE-SU-2015:2194-1, SUSE-SU-2015:2339-1, SUSE-SU-2015:2350-1, SUSE-SU-2016:0354-1, SUSE-SU-2016:0658-1, SUSE-SU-2016:2074-1, USN-2840-1, USN-2841-1, USN-2841-2, USN-2842-1, USN-2842-2, USN-2843-1, USN-2843-2, USN-2844-1, VIGILANCE-VUL-18269, XSA-156
Xen, KVM: infinite loop of x86 Alignment Check Exception
An attacker, who is administrator in a guest system, can generate an infinite loop with an Alignment Check Exception on Xen/KVM, in order to trigger a denial of service on the host system...
CERTFR-2015-AVI-466, CERTFR-2015-AVI-467, CERTFR-2015-AVI-508, CERTFR-2015-AVI-563, CERTFR-2016-AVI-050, CERTFR-2017-AVI-012, CTX202583, CVE-2015-5307, DLA-479-1, DSA-3396-1, DSA-3414-1, DSA-3454-1, FEDORA-2015-115c302856, FEDORA-2015-394835a3f6, FEDORA-2015-668d213dc3, FEDORA-2015-cd94ad8d7c, FEDORA-2015-f150b2a8c8, FEDORA-2015-f2c534bc12, JSA10770, JSA10853, K31026324, openSUSE-SU-2015:2232-1, openSUSE-SU-2015:2249-1, openSUSE-SU-2015:2250-1, openSUSE-SU-2016:0123-1, openSUSE-SU-2016:0124-1, openSUSE-SU-2016:0126-1, openSUSE-SU-2016:0301-1, openSUSE-SU-2016:0318-1, openSUSE-SU-2016:2649-1, RHSA-2015:2552-01, RHSA-2015:2587-01, RHSA-2015:2636-01, RHSA-2015:2645-01, RHSA-2016:0004-01, RHSA-2016:0024-01, RHSA-2016:0046-01, SOL31026324, SUSE-SU-2015:2108-1, SUSE-SU-2015:2194-1, SUSE-SU-2015:2339-1, SUSE-SU-2015:2350-1, SUSE-SU-2016:0354-1, SUSE-SU-2016:0658-1, SUSE-SU-2016:2074-1, USN-2800-1, USN-2801-1, USN-2802-1, USN-2803-1, USN-2804-1, USN-2805-1, USN-2806-1, USN-2807-1, VIGILANCE-VUL-18268, XSA-156
PuTTY: integer overflow of ECH
An attacker, who owns a malicious SSH server, can invite the victim to connect with Putty, to generate an integer overflow with ECH, in order to trigger a denial of service, and possibly to run code...
CERTFR-2015-AVI-540, CVE-2015-5309, DSA-3409-1, FEDORA-2015-3d17682c15, FEDORA-2015-5ad4a1f151, openSUSE-SU-2015:2023-1, VIGILANCE-VUL-18265
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Linux: