Debian

Debian Linux

9142 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 21.09.2022 08:15:09
  • Zuletzt bearbeitet 28.05.2025 16:15:28

mm/mremap.c in the Linux kernel before 5.13.3 has a use-after-free via a stale TLB because an rmap lock is not held during a PUD move.

Exploit
  • EPSS 0.52%
  • Veröffentlicht 21.09.2022 07:15:08
  • Zuletzt bearbeitet 28.05.2025 16:15:28

In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.

  • EPSS 0.52%
  • Veröffentlicht 20.09.2022 21:15:11
  • Zuletzt bearbeitet 29.05.2025 15:15:21

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution.

  • EPSS 0.13%
  • Veröffentlicht 20.09.2022 07:15:12
  • Zuletzt bearbeitet 21.11.2024 07:18:33

The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited...

  • EPSS 0.09%
  • Veröffentlicht 20.09.2022 07:15:12
  • Zuletzt bearbeitet 21.11.2024 07:18:33

The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass for HTTP multipart requests by submitting a payload that uses a character encoding scheme via the Content-Type or the deprecated Content-Transfer-Encoding multipart MI...

  • EPSS 0.12%
  • Veröffentlicht 20.09.2022 07:15:12
  • Zuletzt bearbeitet 21.11.2024 07:18:33

The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass. A client can issue an HTTP Accept header field containing an optional "charset" parameter in order to receive the response in an encoded form. Depending on the "charset"...

  • EPSS 0.28%
  • Veröffentlicht 20.09.2022 07:15:12
  • Zuletzt bearbeitet 21.11.2024 07:18:33

The OWASP ModSecurity Core Rule Set (CRS) is affected by a response body bypass to sequentially exfiltrate small and undetectable sections of data by repeatedly submitting an HTTP Range header field with a small byte range. A restricted resource, acc...

Exploit
  • EPSS 0.61%
  • Veröffentlicht 19.09.2022 22:15:11
  • Zuletzt bearbeitet 21.11.2024 07:14:19

An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 19.09.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 06:56:56

An issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. Users with the editinterface permission can trigger infinite recursion, because a bare local interwiki is mishandled for the mainpage message.

Exploit
  • EPSS 0.42%
  • Veröffentlicht 19.09.2022 21:15:09
  • Zuletzt bearbeitet 21.11.2024 06:56:56

A denial-of-service issue was discovered in MediaWiki before 1.35.6, 1.36.x before 1.36.4, and 1.37.x before 1.37.2. When many files exist, requesting Special:NewFiles with actor as a condition can result in a very long running query.