The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Debian Woody

KDM: connection without a password
Under certain circumstances, an attacker can login via KDM without entering a password...
advisory-20070919-1, BID-25730, CERTA-2007-AVI-410, CVE-2007-4569, DSA-1376-1, FEDORA-2007-2361, FEDORA-2007-716, MDKSA-2007:190, RHSA-2007:0905-01, SSA:2007-264-01, SUSE-SR:2007:021, VIGILANCE-VUL-7181
Avahi: denial of service via D-Bus
A local attacker can stop the Avahi daemon by using a special D-Bus message...
BID-24614, CVE-2007-3372, DSA-1690-1, MDKSA-2007:185, SUSE-SR:2007:014, VIGILANCE-VUL-7176
Cacti: denials of service
An attacker can use graph_* parameters of graph_image.php in order to generate a denial of service...
CVE-2007-3112, CVE-2007-3113, DSA-1954-1, FEDORA-2007-2199, MDKSA-2007:184, VIGILANCE-VUL-7175
OpenOffice: code execution via TIFF
An attacker can create a malicious TIFF image in order to generate an overflow in OpenOffice leading to code execution...
102994, 6571633, BID-25690, CERTA-2007-AVI-405, CVE-2007-2834, DSA-1375-1, FEDORA-2007-2372, FEDORA-2007-700, MDKSA-2007:186, RHSA-2007:0848-01, SUSE-SA:2007:052, VIGILANCE-VUL-7174
Qt: buffer overflow of QUtf8Decoder
An attacker can create an overflow when UTF-8 data are decoded by an application linked to Qt...
20070901-01-P, CERTA-2007-AVI-404, CVE-2007-4137, DSA-1426-1, FEDORA-2007-2216, FEDORA-2007-703, MDKSA-2007:183, RHSA-2007:0883-01, SUSE-SR:2007:019, TLSA-2007-51, VIGILANCE-VUL-7170
Lighttpd: data corruption of mod_fastcgi
An attacker can use a long HTTP header in order to force mod_fastcgi module of Lighttpd to corrupt its data...
CERTA-2002-AVI-162, CVE-2007-4727, DSA-1362-2, FEDORA-2007-2132, SUSE-SR:2007:020, VIGILANCE-VUL-7169
Quagga: denial of service of bgpd
A peer can send a malicious OPEN or COMMUNITY message in order to stop bgpd daemon...
236141, 6554276, 6607647, BID-25634, CVE-2007-4826, DSA-1379-1, FEDORA-2007-2196, MDKSA-2007:182, RHSA-2010:0785-01, VIGILANCE-VUL-7160
X.Org X Server: buffer overflow of Composite extension
A local attacker can elevate his privileges by generating an overflow in the Composite extension of X.Org X Server...
BID-25606, CERTA-2007-AVI-403, CVE-2007-4730, DSA-1372-1, MDKSA-2007:178, RHSA-2007:0898-01, SUSE-SA:2007:054, VIGILANCE-VUL-7158
GForge: SQL injection
An attacker can inject SQL commands in a PHP script of GForge...
BID-25585, CERTA-2002-AVI-162, CVE-2007-3913, DSA-1369-1, VIGILANCE-VUL-7157
PHP: several vulnerabilities
An attacker can use several vulnerabilities of PHP in order to conduct a denial of service or to execute code...
BID-23359, BID-24089, BID-24259, BID-24261, BID-24268, c01178795, CERTA-2008-AVI-065, CERTA-2008-AVI-239, CVE-2007-1900, CVE-2007-2756, CVE-2007-2872, CVE-2007-3007, CVE-2007-3799, CVE-2007-4782, DSA-1444-2, DSA-1578-1, emr_na-c01345501-1, emr_na-c01438646, FEDORA-2007-709, HPSBUX02262, HPSBUX02308, HPSBUX02332, MDKSA-2007:187, MDVSA-2009:021, MDVSA-2009:022, MDVSA-2009:023, MDVSA-2009:024, PMOPB-46-2007, RHSA-2007:0888-01, RHSA-2007:0889-01, RHSA-2007:0890-02, RHSA-2007:0891-01, RHSA-2007:0917-01, RHSA-2008:0505-01, RHSA-2008:0544-01, RHSA-2008:0545-01, RHSA-2008:0582-01, SA-20070601-0, SOL13519, SSA:2007-152-01, SSRT071447, SSRT080010, SSRT080056, SUSE-SA:2007:044, SUSE-SR:2007:015, TLSA-2009-2, VIGILANCE-VUL-6861
Our database contains other pages. You can request a free trial to read them.

Display information about Debian Woody: