The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Debian Wheezy

glib: integer overflows via base64
An attacker can use a long base64 string in order to generate a denial of service or code execution in applications linked to glib...
BID-34101, CERTA-2011-AVI-132, CVE-2008-4316, CVE-2009-0585, CVE-2009-0586, CVE-2009-0587, DSA-1747-1, DSA-1748-1, DSA-1813-1, DSA-1813-2, FEDORA-2009-2657, FEDORA-2009-2688, MDVSA-2009:078, MDVSA-2009:080, MDVSA-2009:081, MDVSA-2009:085, oCERT-2008-015, RHSA-2009:0336-01, RHSA-2009:0344-01, RHSA-2009:0352-01, RHSA-2009:0354-01, RHSA-2009:0355-01, RHSA-2009:0358-01, SSA:2009-086-02, SUSE-SA:2009:026, SUSE-SR:2009:009, SUSE-SR:2009:010, SUSE-SR:2010:012, VIGILANCE-VUL-8536, VMSA-2010-0004, VMSA-2010-0004.1, VMSA-2010-0004.2, VMSA-2010-0004.3
Apache Tomcat: Cross Site Scripting of an example
An attacker can generate a Cross Site Scripting in an example provided with Apache Tomcat...
263529, 6848375, 6849727, c01908935, c02181353, c02515878, CERTA-2011-AVI-169, CVE-2009-0781, DSA-2207-1, FEDORA-2009-11352, FEDORA-2009-11356, FEDORA-2009-11374, HPSBMA02535, HPSBUX02466, HPSBUX02579, MDVSA-2009:136, MDVSA-2009:138, PSN-2012-05-584, RHSA-2009:1164-01, RHSA-2009:1562-01, SSRT090192, SSRT100029, SSRT100203, SUSE-SR:2009:012, SUSE-SR:2009:013, VIGILANCE-VUL-8521, VMSA-2009-0016, VMSA-2009-0016.1, VMSA-2009-0016.2, VMSA-2009-0016.3, VMSA-2009-0016.4, VMSA-2009-0016.5
Poppler: denials of service
An attacker can create a malicious PDF document and invite the victim to open it with a Poppler application in order to stop it...
19702, 19790, CERTA-2009-AVI-448, CVE-2009-0755, CVE-2009-0756, DSA-1941-1, MDVSA-2009:068, MDVSA-2009:068-1, SUSE-SR:2009:012, VIGILANCE-VUL-8520
NetworkManager: two vulnerabilities
Two vulnerabilities of NetworkManager can be used by a local attacker to obtain network passwords or to change the network configuration...
487722, 487752, BID-33966, CVE-2009-0365, CVE-2009-0578, DSA-1955-1, RHSA-2009:0361-01, RHSA-2009:0362-01, SUSE-SA:2009:013, SUSE-SR:2009:009, VIGILANCE-VUL-8519
Linux kernel: denial of service via ipcs
A local attacker can use the ipcs command to stop the system...
BID-34020, CERTA-2002-AVI-235, CVE-2009-0859, DSA-1787-1, DSA-1794-1, DSA-1800-1, SUSE-SA:2009:028, SUSE-SA:2009:030, SUSE-SA:2009:031, SUSE-SA:2009:033, SUSE-SU-2011:0928-1, VIGILANCE-VUL-8516
Firefox, Thunderbird, SeaMonkey: several vulnerabilities
Several vulnerabilities of Firefox, Thunderbird and SeaMonkey can be used by an attacker to obtain information, to create a denial of service or to execute code on victim's computer...
414540, 424276, 435209, 436965, 452979, 457521, 460706, 466057, 467499, 468578, 471594, 472502, 472787, 473709, 474456, 475136, 478901, BID-33827, BID-33990, CERTA-2009-AVI-073, CERTA-2009-AVI-086, CERTA-2009-AVI-109, CERTA-2009-AVI-348, CVE-2008-5907, CVE-2009-0040, CVE-2009-0771, CVE-2009-0772, CVE-2009-0773, CVE-2009-0774, CVE-2009-0775, CVE-2009-0776, CVE-2009-0777, DSA-1751-1, DSA-1830-1, FEDORA-2009-3101, FEDORA-2009-3161, MDVSA-2009:075, MDVSA-2009:083, mfsa2009-07, MFSA 2009-07, mfsa2009-08, MFSA 2009-08, mfsa2009-09, MFSA 2009-09, mfsa2009-10, MFSA 2009-10, mfsa2009-11, MFSA 2009-11, openSUSE-SU-2014:1100-1, RHSA-2009:0258-01, RHSA-2009:0315-00, RHSA-2009:0325-01, SSA:2009-069-02, SSA:2009-083-02, SSA:2009-083-03, SUSE-SA:2009:012, SUSE-SA:2009:022, SUSE-SA:2009:023, TLSA-2009-9, VIGILANCE-VUL-8509, VU#649212, ZDI-09-013
libsndfile: integer overflow via CAF
An attacker can create a malicious CAF file in order to execute code in applications linked to libsndfile...
8507, BID-33963, CVE-2009-0186, DSA-1742-1, FEDORA-2009-11499, FEDORA-2009-11618, MDVSA-2009:067, SUSE-SR:2009:008, VIGILANCE-VUL-8507
cURL: local file reading
An attacker can use a redirect to force cURL to read a local file...
adv_20090303, BID-33962, CERTA-2009-AVI-105, CERTA-2012-AVI-218, CVE-2009-0037, DSA-1738-1, FEDORA-2009-2247, FEDORA-2009-2265, MDVSA-2009:069, RHSA-2009:0341-01, SSA:2009-069-01, SUSE-SR:2009:006, VIGILANCE-VUL-8501, VMSA-2009-0009
Linux kernel: using forbidden system calls on x86_64
On an Intel x86_64 computer, a local attacker can bypass system call restriction mechanisms...
BID-33948, BID-33951, CERTA-2002-AVI-235, CESA-2009-004, CVE-2009-0834, CVE-2009-0835, DSA-1787-1, DSA-1794-1, DSA-1800-1, MDVSA-2009:118, RHSA-2009:0451-02, RHSA-2009:0459-01, RHSA-2009:0473-01, RHSA-2010:0079-01, SUSE-SA:2009:021, SUSE-SA:2009:028, SUSE-SA:2009:030, SUSE-SA:2009:031, VIGILANCE-VUL-8500, VMSA-2009-0016, VMSA-2009-0016.1, VMSA-2009-0016.2, VMSA-2009-0016.3, VMSA-2009-0016.4, VMSA-2009-0016.5
dkim-milter: denial of service
An attacker can use a revoked DKIM key in order to stop dkim-milter...
2508602, FEDORA-2009-2374, VIGILANCE-VUL-8499
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Wheezy: