Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Debian_linux
(Debian)Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2017-02-24 | CVE-2017-6298 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "1 of 9. Null Pointer Deref / calloc return value not checked." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6299 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "2 of 9. Infinite Loop / DoS in the TNEFFillMapi function in lib/ytnef.c." | Debian_linux, Ytnef | 5.5 | ||
2017-02-24 | CVE-2017-6300 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "3 of 9. Buffer Overflow in version field in lib/tnef-types.h." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6301 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "4 of 9. Out of Bounds Reads." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6302 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "5 of 9. Integer Overflow." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6303 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "6 of 9. Invalid Write and Integer Overflow." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6304 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "7 of 9. Out of Bounds read." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6305 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "8 of 9. Out of Bounds read and write." | Debian_linux, Ytnef | 7.8 | ||
2017-02-24 | CVE-2017-6306 | An issue was discovered in ytnef before 1.9.1. This is related to a patch described as "9 of 9. Directory Traversal using the filename; SanitizeFilename function in settings.c." | Debian_linux, Ytnef | 7.8 | ||
2017-03-04 | CVE-2017-6467 | In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size. | Debian_linux, Wireshark | 7.5 |