Product:

Debian_linux

(Debian)
Repositories https://github.com/torvalds/linux
https://github.com/ImageMagick/ImageMagick
https://github.com/WordPress/WordPress
https://github.com/FFmpeg/FFmpeg
https://github.com/rdesktop/rdesktop
https://github.com/krb5/krb5
https://github.com/neomutt/neomutt
https://github.com/FasterXML/jackson-databind
https://github.com/file/file
https://github.com/php/php-src
https://github.com/the-tcpdump-group/tcpdump
https://github.com/redmine/redmine
https://github.com/dbry/WavPack
https://github.com/rubygems/rubygems
https://github.com/uclouvain/openjpeg
https://github.com/bcgit/bc-java
https://github.com/libgd/libgd
https://github.com/kyz/libmspack
https://github.com/mantisbt/mantisbt
https://github.com/gpac/gpac
https://github.com/newsoft/libvncserver
https://github.com/madler/zlib
https://github.com/libgit2/libgit2
https://github.com/mdadams/jasper
https://github.com/FreeRDP/FreeRDP
https://github.com/mruby/mruby
https://github.com/uriparser/uriparser
https://github.com/LibRaw/LibRaw
https://github.com/ceph/ceph
https://github.com/verdammelt/tnef
https://github.com/antirez/redis
https://github.com/Yeraze/ytnef
https://github.com/Perl/perl5
https://github.com/ntp-project/ntp
https://github.com/openssl/openssl
https://github.com/LibVNC/libvncserver
https://github.com/libevent/libevent
https://github.com/ARMmbed/mbedtls
https://github.com/inspircd/inspircd
https://github.com/OTRS/otrs
https://github.com/python-pillow/Pillow
https://github.com/perl5-dbi/DBD-mysql
https://github.com/mm2/Little-CMS
https://github.com/apache/httpd
https://github.com/curl/curl
https://github.com/libjpeg-turbo/libjpeg-turbo
https://github.com/jquery/jquery-ui
https://github.com/openbsd/src
https://github.com/szukw000/openjpeg
https://github.com/mysql/mysql-server
https://github.com/memcached/memcached
https://github.com/openvswitch/ovs
https://github.com/SpiderLabs/ModSecurity
https://github.com/kamailio/kamailio
https://github.com/vadz/libtiff
https://github.com/dovecot/core
https://github.com/znc/znc
https://github.com/horde/horde
https://github.com/mono/mono
https://github.com/ellson/graphviz
• git://git.openssl.org/openssl.git
https://github.com/dajobe/raptor
https://github.com/DanBloomberg/leptonica
https://github.com/django/django
https://github.com/collectd/collectd
https://github.com/weechat/weechat
https://git.kernel.org/pub/scm/git/git.git
https://github.com/akrennmair/newsbeuter
https://github.com/codehaus-plexus/plexus-utils
https://github.com/dom4j/dom4j
https://github.com/sleuthkit/sleuthkit
https://github.com/python/cpython
https://github.com/zhutougg/c3p0
https://github.com/golang/go
https://github.com/haproxy/haproxy
https://github.com/westes/flex
https://github.com/jcupitt/libvips
https://github.com/codehaus-plexus/plexus-archiver
https://github.com/openssh/openssh-portable
https://github.com/jpirko/libndp
https://github.com/inverse-inc/sogo
https://github.com/varnish/Varnish-Cache
https://github.com/varnishcache/varnish-cache
https://github.com/esnet/iperf
https://github.com/paramiko/paramiko
https://github.com/resiprocate/resiprocate
https://github.com/nih-at/libzip
https://github.com/twigphp/Twig
https://github.com/lighttpd/lighttpd1.4
https://github.com/vim/vim
https://github.com/smarty-php/smarty
https://github.com/symfony/symfony
https://github.com/ansible/ansible
https://github.com/mapserver/mapserver
https://github.com/stoth68000/media-tree
https://github.com/ImageMagick/ImageMagick6
https://github.com/antlarr/audiofile
https://github.com/shadow-maint/shadow
https://github.com/lxml/lxml
https://github.com/GStreamer/gst-plugins-ugly
https://github.com/erikd/libsndfile
https://github.com/ruby/openssl
https://github.com/beanshell/beanshell
https://github.com/git/git
https://github.com/cyu/rack-cors
https://github.com/Exim/exim
https://github.com/GNOME/nautilus
https://github.com/phusion/passenger
https://github.com/karelzak/util-linux
https://github.com/apple/cups
https://github.com/shadowsocks/shadowsocks-libev
https://github.com/simplesamlphp/simplesamlphp
https://github.com/GNOME/evince
https://github.com/torproject/tor
https://github.com/derickr/timelib
https://github.com/libarchive/libarchive
https://git.savannah.gnu.org/git/patch.git
https://github.com/puppetlabs/puppet
https://github.com/flori/json
https://github.com/eldy/awstats
https://github.com/simplesamlphp/saml2
https://github.com/anymail/django-anymail
https://github.com/mpv-player/mpv
https://github.com/TeX-Live/texlive-source
https://github.com/vim-syntastic/syntastic
https://github.com/gosa-project/gosa-core
https://github.com/Cisco-Talos/clamav-devel
https://github.com/GNOME/librsvg
https://github.com/viewvc/viewvc
https://github.com/moinwiki/moin-1.9
https://github.com/splitbrain/dokuwiki
https://github.com/heimdal/heimdal
https://github.com/openstack/swauth
https://github.com/bottlepy/bottle
https://github.com/charybdis-ircd/charybdis
https://github.com/mjg59/pupnp-code
https://git.videolan.org/git/vlc.git
https://github.com/atheme/atheme
https://github.com/fragglet/lhasa
https://github.com/neovim/neovim
https://github.com/Quagga/quagga
https://github.com/rohe/pysaml2
https://github.com/PHPMailer/PHPMailer
https://github.com/Automattic/Genericons
https://github.com/jmacd/xdelta-devel
https://github.com/axkibe/lsyncd
https://github.com/quassel/quassel
https://github.com/yarolig/didiwiki
#Vulnerabilities 8810
Date Id Summary Products Score Patch Annotated
2021-05-27 CVE-2021-22885 A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input. Debian_linux, Actionpack_page\-Caching, Rails 7.5
2021-06-09 CVE-2020-24489 Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access. Debian_linux, Atom_x5\-E3930, Atom_x5\-E3940, Atom_x7\-E3950, Celeron_j1750, Celeron_j1800, Celeron_j1850, Celeron_j1900, Celeron_j3060, Celeron_j3160, Celeron_j3355, Celeron_j3355e, Celeron_j3455, Celeron_j3455e, Celeron_j4005, Celeron_j4025, Celeron_j4105, Celeron_j4115, Celeron_j4125, Celeron_j6412, Celeron_j6413, Celeron_n2805, Celeron_n2806, Celeron_n2807, Celeron_n2808, Celeron_n2810, Celeron_n2815, Celeron_n2820, Celeron_n2830, Celeron_n2840, Celeron_n2910, Celeron_n2920, Celeron_n2930, Celeron_n2940, Celeron_n3000, Celeron_n3010, Celeron_n3050, Celeron_n3060, Celeron_n3150, Celeron_n3160, Celeron_n3350, Celeron_n3350e, Celeron_n3450, Celeron_n4000, Celeron_n4000c, Celeron_n4020, Celeron_n4020c, Celeron_n4100, Celeron_n4120, Celeron_n4500, Celeron_n4505, Celeron_n5095, Celeron_n5100, Celeron_n5105, Celeron_n6210, Celeron_n6211, Core_i3\-1000g1, Core_i3\-1000g4, Core_i3\-1000ng4, Core_i3\-1005g1, Core_i3\-10100, Core_i3\-10100e, Core_i3\-10100f, Core_i3\-10100t, Core_i3\-10100te, Core_i3\-10100y, Core_i3\-10105, Core_i3\-10105f, Core_i3\-10105t, Core_i3\-10110u, Core_i3\-10110y, Core_i3\-10300, Core_i3\-10300t, Core_i3\-10305, Core_i3\-10305t, Core_i3\-10320, Core_i3\-10325, Core_i3\-11100b, Core_i3\-1110g4, Core_i3\-1115g4, Core_i3\-1115g4e, Core_i3\-1115gre, Core_i3\-1120g4, Core_i3\-1125g4, Core_i3\-L13g4, Core_i5\-10200h, Core_i5\-10210u, Core_i5\-10210y, Core_i5\-10300h, Core_i5\-1030g4, Core_i5\-1030g7, Core_i5\-1030ng7, Core_i5\-10310u, Core_i5\-10310y, Core_i5\-1035g1, Core_i5\-1035g4, Core_i5\-1035g7, Core_i5\-1038ng7, Core_i5\-10400, Core_i5\-10400f, Core_i5\-10400h, Core_i5\-10400t, Core_i5\-10500, Core_i5\-10500e, Core_i5\-10500h, Core_i5\-10500t, Core_i5\-10500te, Core_i5\-10505, Core_i5\-10600, Core_i5\-10600k, Core_i5\-10600kf, Core_i5\-10600t, Core_i5\-11260h, Core_i5\-11300h, Core_i5\-1130g7, Core_i5\-11320h, Core_i5\-1135g7, Core_i5\-11400, Core_i5\-11400f, Core_i5\-11400h, Core_i5\-11400t, Core_i5\-1140g7, Core_i5\-1145g7, Core_i5\-1145g7e, Core_i5\-1145gre, Core_i5\-11500, Core_i5\-11500b, Core_i5\-11500h, Core_i5\-11500t, Core_i5\-1155g7, Core_i5\-11600, Core_i5\-11600k, Core_i5\-11600kf, Core_i5\-11600t, Core_i5\-L16g7, Core_i7\-10510u, Core_i7\-10510y, Core_i7\-1060g7, Core_i7\-1060ng7, Core_i7\-10610u, Core_i7\-1065g7, Core_i7\-1068ng7, Core_i7\-10700, Core_i7\-10700e, Core_i7\-10700f, Core_i7\-10700k, Core_i7\-10700kf, Core_i7\-10700t, Core_i7\-10700te, Core_i7\-10710u, Core_i7\-10750h, Core_i7\-10810u, Core_i7\-10850h, Core_i7\-10870h, Core_i7\-10875h, Core_i7\-11370h, Core_i7\-11375h, Core_i7\-11390h, Core_i7\-1160g7, Core_i7\-1165g7, Core_i7\-11700, Core_i7\-11700b, Core_i7\-11700f, Core_i7\-11700k, Core_i7\-11700kf, Core_i7\-11700t, Core_i7\-11800h, Core_i7\-1180g7, Core_i7\-11850h, Core_i7\-1185g7, Core_i7\-1185g7e, Core_i7\-1185gre, Core_i7\-1195g7, Core_i9\-10850k, Core_i9\-10885h, Core_i9\-10900, Core_i9\-10900e, Core_i9\-10900f, Core_i9\-10900k, Core_i9\-10900kf, Core_i9\-10900t, Core_i9\-10900te, Core_i9\-10910, Core_i9\-10980hk, Core_i9\-11900, Core_i9\-11900f, Core_i9\-11900h, Core_i9\-11900k, Core_i9\-11900kb, Core_i9\-11900kf, Core_i9\-11900t, Core_i9\-11950h, Core_i9\-11980hk, Pentium_j2850, Pentium_j2900, Pentium_j3710, Pentium_j4205, Pentium_j6426, Pentium_n3510, Pentium_n3520, Pentium_n3530, Pentium_n3540, Pentium_n3700, Pentium_n3710, Pentium_n4200, Pentium_n4200e, Pentium_n6415, Pentium_silver_a1030, Pentium_silver_j5005, Pentium_silver_j5040, Pentium_silver_n5000, Pentium_silver_n5030, Pentium_silver_n6000, Pentium_silver_n6005 8.8
2021-12-24 CVE-2021-45480 An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances. Debian_linux, Linux_kernel 5.5
2021-12-16 CVE-2021-45095 pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak. Debian_linux, Linux_kernel 5.5
2021-12-28 CVE-2021-45909 An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer. Debian_linux, Gif2apng 7.8
2022-01-05 CVE-2021-28711 Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a... Debian_linux, Xen 6.5
2022-01-05 CVE-2021-28712 Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a... Debian_linux, Xen 6.5
2022-01-05 CVE-2021-28713 Rogue backends can cause DoS of guests via high frequency events T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as "driver domains". Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a... Debian_linux, Xen 6.5
2019-03-09 CVE-2019-9638 An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len. Ubuntu_linux, Debian_linux, Storage_automation_store, Leap, Php, Software_collections 7.5
2019-03-09 CVE-2019-9639 An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable. Ubuntu_linux, Debian_linux, Storage_automation_store, Leap, Php, Software_collections 7.5