Debian

Debian Linux

9979 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Medienbericht Exploit
  • EPSS 2.57%
  • Veröffentlicht 22.04.2026 08:15:10
  • Zuletzt bearbeitet 12.05.2026 16:15:00

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-pl...

Exploit
  • EPSS 0.02%
  • Veröffentlicht 09.04.2026 14:41:18
  • Zuletzt bearbeitet 13.05.2026 23:07:51

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.0.9 to before 1.6.57, passing a pointer obtained from png_get_PLTE, png_get_tRNS, or png_get_hIST back ...

  • EPSS 0.05%
  • Veröffentlicht 24.03.2026 14:42:47
  • Zuletzt bearbeitet 11.05.2026 22:22:14

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write du...

  • EPSS 0.05%
  • Veröffentlicht 23.03.2026 21:26:14
  • Zuletzt bearbeitet 04.05.2026 15:30:08

An incomplete fix for CVE-2024-47778 allows an out-of-bounds read in gst_wavparse_adtl_chunk() function. The patch added a size validation check lsize + 8 > size, but it does not account for the GST_ROUND_UP_2(lsize) used in the actual offset calcula...

Exploit
  • EPSS 0.08%
  • Veröffentlicht 20.03.2026 00:00:00
  • Zuletzt bearbeitet 07.04.2026 16:08:00

AWStats 8.0 is vulnerable to Command Injection via the open function

  • EPSS 0.03%
  • Veröffentlicht 10.02.2026 18:55:57
  • Zuletzt bearbeitet 25.02.2026 17:39:03

MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from proces...

  • EPSS 0.03%
  • Veröffentlicht 03.02.2026 19:29:09
  • Zuletzt bearbeitet 18.02.2026 16:15:29

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packe...

  • EPSS 0.03%
  • Veröffentlicht 03.02.2026 19:26:22
  • Zuletzt bearbeitet 18.02.2026 16:11:20

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, a heap buffer overflow exists in the Fast-DDS DATA_FRAG receive path. An un authentica...

  • EPSS 0.05%
  • Veröffentlicht 03.02.2026 19:23:38
  • Zuletzt bearbeitet 18.02.2026 16:11:42

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). ParticipantGenericMessage is the DDS Security control-message container that carries not only the handshake but also on going secu...

  • EPSS 0.03%
  • Veröffentlicht 03.02.2026 19:20:55
  • Zuletzt bearbeitet 18.02.2026 16:12:00

Fast DDS is a C++ implementation of the DDS (Data Distribution Service) standard of the OMG (Object Management Group ). Prior to versions 3.4.1, 3.3.1, and 2.6.11, when the security mode is enabled, modifying the DATA Submessage within an SPDP packe...