Debian

Debian Linux

9140 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Veröffentlicht 29.02.2024 00:15:51
  • Zuletzt bearbeitet 14.02.2025 15:51:42

Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations ...

Exploit
  • EPSS 3.32%
  • Veröffentlicht 28.02.2024 20:15:41
  • Zuletzt bearbeitet 14.02.2025 15:31:24

YARD is a Ruby Documentation tool. The "frames.html" file within the Yard Doc's generated documentation is vulnerable to Cross-Site Scripting (XSS) attacks due to inadequate sanitization of user input within the JavaScript segment of the "frames.erb"...

  • EPSS 0.05%
  • Veröffentlicht 26.02.2024 16:27:58
  • Zuletzt bearbeitet 23.04.2025 16:18:17

Splinefont in FontForge through 20230101 allows command injection via crafted filenames.

  • EPSS 0.65%
  • Veröffentlicht 26.02.2024 16:27:58
  • Zuletzt bearbeitet 23.04.2025 16:18:54

Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.

  • EPSS 0.45%
  • Veröffentlicht 26.02.2024 16:27:56
  • Zuletzt bearbeitet 13.02.2025 18:16:46

Jetty is a Java based web server and servlet engine. An HTTP/2 SSL connection that is established and TCP congested will be leaked when it times out. An attacker can cause many connections to end up in this state, and the server may run out of file d...

  • EPSS 0.01%
  • Veröffentlicht 23.02.2024 15:15:09
  • Zuletzt bearbeitet 21.11.2024 09:02:37

In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: vgic-its: Avoid potential UAF in LPI translation cache There is a potential UAF scenario in the case of an LPI translation cache hit racing with an operation that inval...

  • EPSS 1.49%
  • Veröffentlicht 22.02.2024 17:15:08
  • Zuletzt bearbeitet 05.05.2025 14:14:41

The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vuln...

  • EPSS 0.02%
  • Veröffentlicht 20.02.2024 18:15:50
  • Zuletzt bearbeitet 17.01.2025 20:15:27

In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential OOBs in smb2_parse_contexts() Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). This fixes following oops when...

  • EPSS 0.37%
  • Veröffentlicht 20.02.2024 14:15:08
  • Zuletzt bearbeitet 27.03.2025 14:35:06

When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8.

  • EPSS 0.49%
  • Veröffentlicht 20.02.2024 14:15:08
  • Zuletzt bearbeitet 28.03.2025 18:15:16

Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115....